0009:trace:relay:load_list L"RelayExclude" = L"ntdll.RtlEnterCriticalSection;ntdll.RtlLeaveCriticalSection;kernel32.48;kernel32.49;kernel32.94;kernel32.95;kernel32.96;kernel32.97;kernel32.98;kernel32.TlsGetValue;kernel32.TlsSetValue;kernel32.FlsGetValue;kernel32.FlsSetValue;kernel32.SetLastError" 0009:trace:relay:load_list L"RelayFromExclude" = L"winex11.drv;user32;gdi32;advapi32;kernel32" 0009:Call KERNEL32.__wine_kernel_init() ret=7bc41649 000b:trace:relay:load_list L"RelayExclude" = L"ntdll.RtlEnterCriticalSection;ntdll.RtlLeaveCriticalSection;kernel32.48;kernel32.49;kernel32.94;kernel32.95;kernel32.96;kernel32.97;kernel32.98;kernel32.TlsGetValue;kernel32.TlsSetValue;kernel32.FlsGetValue;kernel32.FlsSetValue;kernel32.SetLastError" 000b:trace:relay:load_list L"RelayFromExclude" = L"winex11.drv;user32;gdi32;advapi32;kernel32" 000b:Call KERNEL32.__wine_kernel_init() ret=7bc41649 000b:Call PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_ATTACH,res=0x1) 000b:Ret PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_ATTACH,res=0x1) 000b:Ret PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x405c8c90,module=0x40590000 L"advapi32.dll",reason=PROCESS_ATTACH,res=0x1) 000b:Ret PE DLL (proc=0x405c8c90,module=0x40590000 L"advapi32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000b:Starting process L"C:\\windows\\system32\\wineboot.exe" (entryproc=0x401c4d10) 000b:Call KERNEL32.GetWindowsDirectoryW(401cf4a0,00000104) ret=401c2fae 000b:Ret KERNEL32.GetWindowsDirectoryW() retval=0000000a ret=401c2fae 000b:Call KERNEL32.SetCurrentDirectoryW(401cf4a0 L"C:\\windows") ret=401c2fbf 000b:Ret KERNEL32.SetCurrentDirectoryW() retval=00000001 ret=401c2fbf 000b:Call KERNEL32.CreateEventW(0033fe74,00000001,00000000,401c5980 L"__wineboot_event") ret=401c32c6 000b:Ret KERNEL32.CreateEventW() retval=00000010 ret=401c32c6 000b:Call KERNEL32.ResetEvent(00000010) ret=401c32d7 000b:Ret KERNEL32.ResetEvent() retval=00000001 ret=401c32d7 000b:Call ntdll.NtQuerySystemInformation(00000001,0033f05c,0000000c,00000000) ret=401c3306 000b:Ret ntdll.NtQuerySystemInformation() retval=00000000 ret=401c3306 000b:Call ntdll.NtPowerInformation(0000000b,00000000,00000000,0033fc6c,00000018) ret=401c333d 000b:Ret ntdll.NtPowerInformation() retval=00000000 ret=401c333d 000b:Call advapi32.RegCreateKeyExW(80000002,401c5b20 L"Hardware\\Description\\System",00000000,00000000,00000001,000f003f,00000000,0033fe80,00000000) ret=401c33e6 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c33e6 000b:Call advapi32.RegSetValueExW(00000018,401c5a88 L"Identifier",00000000,00000001,401c5a6c,0000001c) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegCreateKeyExW(00000018,401c5ae0 L"FloatingPointProcessor",00000000,00000000,00000001,000f003f,00000000,0033fe84,00000000) ret=401c3c8d 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c3c8d 000b:Call advapi32.RegCreateKeyExW(00000018,401c5aa0 L"CentralProcessor",00000000,00000000,00000001,000f003f,00000000,0033fe88,00000000) ret=401c3ced 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c3ced 000b:Call advapi32.RegCreateKeyExW(00000020,0033fa64 L"0",00000000,00000000,00000001,000f003f,00000000,0033fe8c,00000000) ret=401c3e3b 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c3e3b 000b:Call advapi32.RegSetValueExW(00000024,401c5a88 L"Identifier",00000000,00000001,0033f85c,00000042) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(00000024,401c5a40 L"VendorIdentifier",00000000,00000001,401c5a0c,0000001a) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(00000024,401c5a62 L"~MHz",00000000,00000004,0033fc70,00000004) ret=401c3ea5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c3ea5 000b:Call advapi32.RegCloseKey(00000024) ret=401c3eb3 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c3eb3 000b:Call advapi32.RegCreateKeyExW(0000001c,0033fa64 L"0",00000000,00000000,00000001,000f003f,00000000,0033fe8c,00000000) ret=401c3dbe 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c3dbe 000b:Call advapi32.RegSetValueExW(00000024,401c5a88 L"Identifier",00000000,00000001,0033f85c,00000042) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegCloseKey(00000024) ret=401c40c3 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c40c3 000b:Call advapi32.RegCreateKeyExW(00000020,0033fa64 L"1",00000000,00000000,00000001,000f003f,00000000,0033fe8c,00000000) ret=401c3e3b 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c3e3b 000b:Call advapi32.RegSetValueExW(00000024,401c5a88 L"Identifier",00000000,00000001,0033f85c,00000042) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(00000024,401c5a40 L"VendorIdentifier",00000000,00000001,401c5a0c,0000001a) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(00000024,401c5a62 L"~MHz",00000000,00000004,0033fc70,00000004) ret=401c3ea5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c3ea5 000b:Call advapi32.RegCloseKey(00000024) ret=401c3eb3 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c3eb3 000b:Call advapi32.RegCreateKeyExW(0000001c,0033fa64 L"1",00000000,00000000,00000001,000f003f,00000000,0033fe8c,00000000) ret=401c3dbe 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c3dbe 000b:Call advapi32.RegSetValueExW(00000024,401c5a88 L"Identifier",00000000,00000001,0033f85c,00000042) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegCloseKey(00000024) ret=401c40c3 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c40c3 000b:Call advapi32.RegCloseKey(0000001c) ret=401c410f 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c410f 000b:Call advapi32.RegCloseKey(00000020) ret=401c411d 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c411d 000b:Call advapi32.RegCloseKey(00000018) ret=401c412b 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c412b 000b:Call advapi32.RegCreateKeyExW(80000006,401c5ba0 L"PerfStats\\StatData",00000000,00000000,00000000,00020006,00000000,0033fe84,00000000) ret=401c3455 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c3455 000b:Call advapi32.RegCloseKey(00000020) ret=401c3c1f 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c3c1f 000b:Call advapi32.RegCreateKeyExW(80000006,401c5b60 L"Config Manager\\Enum",00000000,00000000,00000000,00020006,00000000,0033fe84,00000000) ret=401c34b0 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c34b0 000b:Call advapi32.RegCloseKey(00000020) ret=401c3c0c 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c3c0c 000b:Call ntdll.NtQuerySystemInformation(00000001,0033f05c,0000000c,00000000) ret=401c34e1 000b:Ret ntdll.NtQuerySystemInformation() retval=00000000 ret=401c34e1 000b:Call advapi32.RegCreateKeyW(80000002,401c5d80 L"System\\CurrentControlSet\\Control\\Session Manager\\Environment",0033fe84) ret=401c3504 000b:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c3504 000b:Call advapi32.RegSetValueExW(0000001c,401c5d40 L"NUMBER_OF_PROCESSORS",00000000,00000001,0033f85c,00000004) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(0000001c,401c5d00 L"PROCESSOR_ARCHITECTURE",00000000,00000001,401c5cea,00000008) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(0000001c,401c5cc0 L"PROCESSOR_IDENTIFIER",00000000,00000001,0033f85c,0000005e) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(0000001c,401c5ca0 L"PROCESSOR_LEVEL",00000000,00000001,0033f85c,00000004) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(0000001c,401c5c60 L"PROCESSOR_REVISION",00000000,00000001,0033f85c,0000000a) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegCloseKey(0000001c) ret=401c3bf9 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c3bf9 000b:Call KERNEL32.GetPrivateProfileSectionW(401c5e2a L"rename",0033f05c,00000400,401c5e12 L"wininit.ini") ret=401c3556 000b:Ret KERNEL32.GetPrivateProfileSectionW() retval=00000000 ret=401c3556 000b:Call advapi32.RegOpenKeyExW(80000002,401c5e40 L"System\\CurrentControlSet\\Control\\Session Manager",00000000,000f003f,0033fe88) ret=401c361a 000b:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c361a 000b:Call advapi32.RegQueryValueExW(0000001c,401c5ec0 L"PendingFileRenameOperations",00000000,00000000,00000000,0033fe84) ret=401c41e3 000b:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c41e3 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c4231 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c4231 000b:Call advapi32.RegCloseKey(0000001c) ret=401c4247 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c4247 000b:Call advapi32.RegOpenKeyW(80000002,401c5f40 L"Software\\Microsoft\\Windows NT\\CurrentVersion\\Winlogon",0033fe88) ret=401c3652 000b:Ret advapi32.RegOpenKeyW() retval=00000002 ret=401c3652 000b:Call advapi32.RegCloseKey(00000000) ret=401c36ad 000b:Ret advapi32.RegCloseKey() retval=00000006 ret=401c36ad 000b:Call KERNEL32.GetSystemDirectoryW(00000000,00000000) ret=401c36c4 000b:Ret KERNEL32.GetSystemDirectoryW() retval=00000014 ret=401c36c4 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000040) ret=401c36eb 000b:Ret ntdll.RtlAllocateHeap() retval=00116148 ret=401c36eb 000b:Call KERNEL32.GetSystemDirectoryW(00116148,00000014) ret=401c3700 000b:Ret KERNEL32.GetSystemDirectoryW() retval=00000013 ret=401c3700 000b:Call KERNEL32.FindFirstFileW(00116148 L"C:\\windows\\system32\\dllcache\\*",0033f05c) ret=401c375a 000b:Ret KERNEL32.FindFirstFileW() retval=ffffffff ret=401c375a 000b:Call KERNEL32.FindClose(ffffffff) ret=401c38c4 000b:Ret KERNEL32.FindClose() retval=00000000 ret=401c38c4 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00116148) ret=401c38ea 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c38ea 000b:Call advapi32.RegOpenKeyExW(80000002,401c6200 L"Software\\Microsoft\\Windows\\CurrentVersion",00000000,00020019,0033ef2c) ret=401c16b7 000b:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c16b7 000b:Call advapi32.RegOpenKeyExW(0000001c,401c5934 L"RunServicesOnce",00000000,000f003f,0033ef28) ret=401c16f8 000b:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=401c16f8 000b:Call advapi32.RegCloseKey(0000001c) ret=401c170a 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c170a 000b:Call advapi32.RegOpenKeyExW(80000002,401c6200 L"Software\\Microsoft\\Windows\\CurrentVersion",00000000,00020019,0033ef2c) ret=401c16b7 000b:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c16b7 000b:Call advapi32.RegOpenKeyExW(0000001c,401c58f8 L"RunServices",00000000,00020019,0033ef28) ret=401c16f8 000b:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c16f8 000b:Call advapi32.RegCloseKey(0000001c) ret=401c172b 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c172b 000b:Call advapi32.RegQueryInfoKeyW(00000020,00000000,00000000,00000000,00000000,00000000,00000000,0033ef24,0033ef1c,0033ef20,00000000,00000000) ret=401c178e 000b:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=401c178e 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,0000005c) ret=401c1938 000b:Ret ntdll.RtlAllocateHeap() retval=00116148 ret=401c1938 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000020) ret=401c1970 000b:Ret ntdll.RtlAllocateHeap() retval=001161b0 ret=401c1970 000b:Call advapi32.RegEnumValueW(00000020,00000000,001161b0,0033ef18,00000000,0033ef10,00116148,0033ef14) ret=401c1a2b 000b:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c1a2b 000b:Call KERNEL32.CreateProcessW(00000000,00116148 L"C:\\windows\\system32\\winemenubuilder.exe -a -r",00000000,00000000,00000000,00000000,00000000,00000000,0033eeb8,0033eefc) ret=401c1c37 000d:trace:relay:load_list L"RelayExclude" = L"ntdll.RtlEnterCriticalSection;ntdll.RtlLeaveCriticalSection;kernel32.48;kernel32.49;kernel32.94;kernel32.95;kernel32.96;kernel32.97;kernel32.98;kernel32.TlsGetValue;kernel32.TlsSetValue;kernel32.FlsGetValue;kernel32.FlsSetValue;kernel32.SetLastError" 000d:trace:relay:load_list L"RelayFromExclude" = L"winex11.drv;user32;gdi32;advapi32;kernel32" 000d:Call KERNEL32.__wine_kernel_init() ret=7bc41649 000b:Ret KERNEL32.CreateProcessW() retval=00000001 ret=401c1c37 000b:Call KERNEL32.CloseHandle(0000002c) ret=401c1cb0 000b:Ret KERNEL32.CloseHandle() retval=00000001 ret=401c1cb0 000b:Call KERNEL32.CloseHandle(00000028) ret=401c1cbe 000b:Ret KERNEL32.CloseHandle() retval=00000001 ret=401c1cbe 000b:Call ntdll.RtlFreeHeap(00110000,00000000,001161b0) ret=401c17ed 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c17ed 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00116148) ret=401c1813 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1813 000b:Call advapi32.RegCloseKey(00000020) ret=401c1825 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c1825 000b:Call KERNEL32.GetSystemDirectoryW(0033f85c,000000f7) ret=401c3979 000b:Ret KERNEL32.GetSystemDirectoryW() retval=00000013 ret=401c3979 000b:Call KERNEL32.CreateProcessW(0033f85c L"C:\\windows\\system32\\services.exe",0033f85c L"C:\\windows\\system32\\services.exe",00000000,00000000,00000001,00000000,00000000,00000000,0033fc6c,0033fa64) ret=401c3a42 000d:Call PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_ATTACH,res=0x1) 000d:Ret PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_ATTACH,res=0x1) 000d:Ret PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x407c8c90,module=0x40790000 L"advapi32.dll",reason=PROCESS_ATTACH,res=0x1) 000d:Ret PE DLL (proc=0x407c8c90,module=0x40790000 L"advapi32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x42a17de0,module=0x429c0000 L"gdi32.dll",reason=PROCESS_ATTACH,res=0x1) 000f:trace:relay:load_list L"RelayExclude" = L"ntdll.RtlEnterCriticalSection;ntdll.RtlLeaveCriticalSection;kernel32.48;kernel32.49;kernel32.94;kernel32.95;kernel32.96;kernel32.97;kernel32.98;kernel32.TlsGetValue;kernel32.TlsSetValue;kernel32.FlsGetValue;kernel32.FlsSetValue;kernel32.SetLastError" 000f:trace:relay:load_list L"RelayFromExclude" = L"winex11.drv;user32;gdi32;advapi32;kernel32" 000f:Call KERNEL32.__wine_kernel_init() ret=7bc41649 000b:Ret KERNEL32.CreateProcessW() retval=00000001 ret=401c3a42 000b:Call KERNEL32.CloseHandle(00000028) ret=401c4643 000b:Ret KERNEL32.CloseHandle() retval=00000001 ret=401c4643 000b:Call KERNEL32.CreateEventW(00000000,00000001,00000000,401c5fe0 L"__wine_SvcctlStarted") ret=401c466c 000b:Ret KERNEL32.CreateEventW() retval=0000001c ret=401c466c 000b:Call KERNEL32.WaitForMultipleObjects(00000002,0033f05c,00000000,ffffffff) ret=401c46a7 000f:Call PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_ATTACH,res=0x1) 000f:Ret PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000f:Call PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_ATTACH,res=0x1) 000f:Ret PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000f:Call PE DLL (proc=0x406d6c90,module=0x406a0000 L"advapi32.dll",reason=PROCESS_ATTACH,res=0x1) 000f:Ret PE DLL (proc=0x406d6c90,module=0x406a0000 L"advapi32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000f:Call PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=PROCESS_ATTACH,res=0x1) 000f:Ret PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000f:Starting process L"C:\\windows\\system32\\services.exe" (entryproc=0x401cca10) 000f:Call KERNEL32.CreateEventW(00000000,00000001,00000000,401cd700 L"__wine_SvcctlStarted") ret=401c3fd8 000f:Ret KERNEL32.CreateEventW() retval=00000014 ret=401c3fd8 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000028) ret=401c4004 000f:Ret ntdll.RtlAllocateHeap() retval=00115010 ret=401c4004 000f:Call KERNEL32.InitializeCriticalSection(00115020) ret=401c4041 000f:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=401c4041 000f:Call advapi32.RegCreateKeyExW(80000002,401cd740 L"System\\CurrentControlSet\\Services",00000000,00000000,00000000,02000000,00000000,00115010,00000000) ret=401c4096 000f:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c4096 000f:Call advapi32.RegEnumKeyW(0000001c,00000000,0033fc80,00000104) ret=401c4159 000f:Ret advapi32.RegEnumKeyW() retval=00000000 ret=401c4159 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000074) ret=401c3f1c 000f:Ret ntdll.RtlAllocateHeap() retval=00117178 ret=401c3f1c 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c500e 000f:Ret ntdll.RtlAllocateHeap() retval=001171f8 ret=401c500e 000f:Call advapi32.RegOpenKeyExW(0000001c,0033fc80 L"BITS",00000000,00020019,0033fe88) ret=401c41b8 000f:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c41b8 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117210 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00117210,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd798 L"Group",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117248 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,00117248,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117270 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00117270,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7d2 L"Description",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd800 L"DependOnService",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=00117288 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd820 L"DependOnGroup",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=001172a0 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd83c L"Type",00000000,0033fbc8,001171b0,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd846 L"Start",00000000,0033fbc8,001171b4,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd852 L"ErrorControl",00000000,0033fbc8,001171b8,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd86c L"Tag",00000000,0033fbc8,001171c4,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c54a1 000f:Call advapi32.RegCloseKey(00000020) ret=401c4905 000f:Ret advapi32.RegCloseKey() retval=00000000 ret=401c4905 000f:Call advapi32.RegEnumKeyW(0000001c,00000001,0033fc80,00000104) ret=401c4159 000f:Ret advapi32.RegEnumKeyW() retval=00000000 ret=401c4159 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000074) ret=401c3f1c 000f:Ret ntdll.RtlAllocateHeap() retval=001172b8 ret=401c3f1c 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c500e 000f:Ret ntdll.RtlAllocateHeap() retval=00117338 ret=401c500e 000f:Call advapi32.RegOpenKeyExW(0000001c,0033fc80 L"MountMgr",00000000,00020019,0033fe88) ret=401c41b8 000f:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c41b8 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000054) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117358 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00117358,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd798 L"Group",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=001173b8 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,001173b8,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=001173e0 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,001173e0,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7d2 L"Description",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000032) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117408 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7d2 L"Description",00000000,0033fbc8,00117408,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd800 L"DependOnService",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=00117448 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd820 L"DependOnGroup",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=00117460 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd83c L"Type",00000000,0033fbc8,001172f0,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd846 L"Start",00000000,0033fbc8,001172f4,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd852 L"ErrorControl",00000000,0033fbc8,001172f8,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd86c L"Tag",00000000,0033fbc8,00117304,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c54a1 000f:Call advapi32.RegCloseKey(00000020) ret=401c4905 000f:Ret advapi32.RegCloseKey() retval=00000000 ret=401c4905 000f:Call advapi32.RegEnumKeyW(0000001c,00000002,0033fc80,00000104) ret=401c4159 000f:Ret advapi32.RegEnumKeyW() retval=00000000 ret=401c4159 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000074) ret=401c3f1c 000f:Ret ntdll.RtlAllocateHeap() retval=00117478 ret=401c3f1c 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c500e 000f:Ret ntdll.RtlAllocateHeap() retval=001174f8 ret=401c500e 000f:Call advapi32.RegOpenKeyExW(0000001c,0033fc80 L"MSIServer",00000000,00020019,0033fe88) ret=401c41b8 000f:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c41b8 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000048) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117518 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00117518,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd798 L"Group",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117568 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,00117568,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117590 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00117590,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7d2 L"Description",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd800 L"DependOnService",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=001175b0 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd820 L"DependOnGroup",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=001175c8 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd83c L"Type",00000000,0033fbc8,001174b0,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd846 L"Start",00000000,0033fbc8,001174b4,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd852 L"ErrorControl",00000000,0033fbc8,001174b8,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd86c L"Tag",00000000,0033fbc8,001174c4,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c54a1 000f:Call advapi32.RegCloseKey(00000020) ret=401c4905 000f:Ret advapi32.RegCloseKey() retval=00000000 ret=401c4905 000f:Call advapi32.RegEnumKeyW(0000001c,00000003,0033fc80,00000104) ret=401c4159 000f:Ret advapi32.RegEnumKeyW() retval=00000000 ret=401c4159 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000074) ret=401c3f1c 000f:Ret ntdll.RtlAllocateHeap() retval=001175e0 ret=401c3f1c 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c500e 000f:Ret ntdll.RtlAllocateHeap() retval=00117660 ret=401c500e 000f:Call advapi32.RegOpenKeyExW(0000001c,0033fc80 L"Spooler",00000000,00020019,0033fe88) ret=401c41b8 000f:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c41b8 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117678 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00117678,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd798 L"Group",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=001176c8 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd798 L"Group",00000000,0033fbc8,001176c8,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=001176f0 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,001176f0,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117718 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00117718,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7d2 L"Description",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000054) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117740 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7d2 L"Description",00000000,0033fbc8,00117740,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd800 L"DependOnService",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=001177a0 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd820 L"DependOnGroup",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=001177b8 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd83c L"Type",00000000,0033fbc8,00117618,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd846 L"Start",00000000,0033fbc8,0011761c,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd852 L"ErrorControl",00000000,0033fbc8,00117620,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd86c L"Tag",00000000,0033fbc8,0011762c,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c54a1 000f:Call advapi32.RegCloseKey(00000020) ret=401c4905 000f:Ret advapi32.RegCloseKey() retval=00000000 ret=401c4905 000f:Call advapi32.RegEnumKeyW(0000001c,00000004,0033fc80,00000104) ret=401c4159 000f:Ret advapi32.RegEnumKeyW() retval=00000000 ret=401c4159 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000074) ret=401c3f1c 000f:Ret ntdll.RtlAllocateHeap() retval=001177d0 ret=401c3f1c 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c500e 000f:Ret ntdll.RtlAllocateHeap() retval=00117850 ret=401c500e 000f:Call advapi32.RegOpenKeyExW(0000001c,0033fc80 L"stisvc",00000000,00020019,0033fe88) ret=401c41b8 000f:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c41b8 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117868 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00117868,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd798 L"Group",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=001178a0 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,001178a0,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=001178c8 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,001178c8,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7d2 L"Description",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd800 L"DependOnService",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=001178e0 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd820 L"DependOnGroup",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=001178f8 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd83c L"Type",00000000,0033fbc8,00117808,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd846 L"Start",00000000,0033fbc8,0011780c,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd852 L"ErrorControl",00000000,0033fbc8,00117810,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd86c L"Tag",00000000,0033fbc8,0011781c,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c54a1 000f:Call advapi32.RegCloseKey(00000020) ret=401c4905 000f:Ret advapi32.RegCloseKey() retval=00000000 ret=401c4905 000f:Call advapi32.RegEnumKeyW(0000001c,00000005,0033fc80,00000104) ret=401c4159 000f:Ret advapi32.RegEnumKeyW() retval=00000000 ret=401c4159 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000074) ret=401c3f1c 000f:Ret ntdll.RtlAllocateHeap() retval=00117910 ret=401c3f1c 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=401c500e 000f:Ret ntdll.RtlAllocateHeap() retval=00117990 ret=401c500e 000f:Call advapi32.RegOpenKeyExW(0000001c,0033fc80 L"TermService",00000000,00020019,0033fe88) ret=401c41b8 000f:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c41b8 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000040) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=001179b0 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,001179b0,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd798 L"Group",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=001179f8 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,001179f8,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117a20 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00117a20,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd7d2 L"Description",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c526b 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=401c535b 000f:Ret ntdll.RtlAllocateHeap() retval=00117a50 ret=401c535b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7d2 L"Description",00000000,0033fbc8,00117a50,0033fbcc) ret=401c5389 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c5389 000f:Call advapi32.RegQueryValueExW(00000020,401cd800 L"DependOnService",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=00117a88 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd820 L"DependOnGroup",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=00117aa0 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd83c L"Type",00000000,0033fbc8,00117948,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd846 L"Start",00000000,0033fbc8,0011794c,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd852 L"ErrorControl",00000000,0033fbc8,00117950,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd86c L"Tag",00000000,0033fbc8,0011795c,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c54a1 000f:Call advapi32.RegCloseKey(00000020) ret=401c4905 000f:Ret advapi32.RegCloseKey() retval=00000000 ret=401c4905 000f:Call advapi32.RegEnumKeyW(0000001c,00000006,0033fc80,00000104) ret=401c4159 000f:Ret advapi32.RegEnumKeyW() retval=00000000 ret=401c4159 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000074) ret=401c3f1c 000f:Ret ntdll.RtlAllocateHeap() retval=00117ab8 ret=401c3f1c 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c500e 000f:Ret ntdll.RtlAllocateHeap() retval=00117b38 ret=401c500e 000f:Call advapi32.RegOpenKeyExW(0000001c,0033fc80 L"VxD",00000000,00020019,0033fe88) ret=401c41b8 000f:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c41b8 000f:Call advapi32.RegQueryValueExW(00000020,401cd784 L"ImagePath",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd798 L"Group",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7a4 L"ObjectName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7ba L"DisplayName",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd7d2 L"Description",00000000,0033fbc8,00000000,0033fbcc) ret=401c526b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c526b 000f:Call advapi32.RegQueryValueExW(00000020,401cd800 L"DependOnService",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=00117b50 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd820 L"DependOnGroup",00000000,0033fbc8,00000000,0033fbcc) ret=401c508b 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c508b 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,00000002) ret=401c5201 000f:Ret ntdll.RtlAllocateHeap() retval=00117b68 ret=401c5201 000f:Call advapi32.RegQueryValueExW(00000020,401cd83c L"Type",00000000,0033fbc8,00117af0,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd846 L"Start",00000000,0033fbc8,00117af4,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd852 L"ErrorControl",00000000,0033fbc8,00117af8,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c54a1 000f:Call advapi32.RegQueryValueExW(00000020,401cd86c L"Tag",00000000,0033fbc8,00117b04,0033fbcc) ret=401c54a1 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c54a1 000f:Call advapi32.RegCloseKey(00000020) ret=401c4905 000f:Ret advapi32.RegCloseKey() retval=00000000 ret=401c4905 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117b38) ret=401c2eab 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2eab 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c2ecf 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2ecf 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c2ef3 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2ef3 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c2f17 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2f17 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c2f3b 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2f3b 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c2f5f 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2f5f 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c2f83 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2f83 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117b50) ret=401c2fa7 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2fa7 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117b68) ret=401c2fcb 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2fcb 000f:Call KERNEL32.CloseHandle(00000000) ret=401c2fd9 000f:Ret KERNEL32.CloseHandle() retval=00000000 ret=401c2fd9 000f:Call KERNEL32.CloseHandle(ffffffff) ret=401c2fe7 000f:Ret KERNEL32.CloseHandle() retval=00000000 ret=401c2fe7 000f:Call KERNEL32.CloseHandle(00000000) ret=401c2ff5 000f:Ret KERNEL32.CloseHandle() retval=00000000 ret=401c2ff5 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117ab8) ret=401c3015 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c3015 000f:Call advapi32.RegEnumKeyW(0000001c,00000007,0033fc80,00000104) ret=401c4159 000f:Ret advapi32.RegEnumKeyW() retval=00000103 ret=401c4159 000f:Call rpcrt4.RpcServerUseProtseqEpW(0033fbce L"ncacn_np",00000000,0033fbb4 L"\\pipe\\svcctl",00000000) ret=401c0fe4 000f:Call KERNEL32.WideCharToMultiByte(00000000,00000000,0033fbce L"ncacn_np",ffffffff,00000000,00000000,00000000,00000000) ret=4064169c 000f:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=4064169c 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=406416be 000f:Ret ntdll.RtlAllocateHeap() retval=00117ab8 ret=406416be 000f:Call KERNEL32.WideCharToMultiByte(00000000,00000000,0033fbce L"ncacn_np",ffffffff,00117ab8,00000009,00000000,00000000) ret=406416fb 000f:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=406416fb 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000040) ret=40652158 000f:Ret ntdll.RtlAllocateHeap() retval=00117ad0 ret=40652158 000f:Call KERNEL32.CreateEventW(00000000,00000000,00000000,00000000) ret=40652185 000f:Ret KERNEL32.CreateEventW() retval=00000020 ret=40652185 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=40642260 000f:Ret ntdll.RtlAllocateHeap() retval=00117b18 ret=40642260 000f:Call KERNEL32.InitializeCriticalSection(00117ae8) ret=4064be62 000f:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=4064be62 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117ab8) ret=40640766 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40640766 000f:Call KERNEL32.WideCharToMultiByte(00000000,00000000,0033fbb4 L"\\pipe\\svcctl",ffffffff,00000000,00000000,00000000,00000000) ret=4064169c 000f:Ret KERNEL32.WideCharToMultiByte() retval=0000000d ret=4064169c 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=406416be 000f:Ret ntdll.RtlAllocateHeap() retval=00117ab8 ret=406416be 000f:Call KERNEL32.WideCharToMultiByte(00000000,00000000,0033fbb4 L"\\pipe\\svcctl",ffffffff,00117ab8,0000000d,00000000,00000000) ret=406416fb 000f:Ret KERNEL32.WideCharToMultiByte() retval=0000000d ret=406416fb 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000090) ret=40652bc7 000f:Ret ntdll.RtlAllocateHeap() retval=00117b58 ret=40652bc7 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=40642260 000f:Ret ntdll.RtlAllocateHeap() retval=00117bf0 ret=40642260 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=40658121 000f:Ret ntdll.RtlAllocateHeap() retval=00117c08 ret=40658121 000f:Call KERNEL32.CreateNamedPipeA(00117c08 "\\\\.\\pipe\\svcctl",00000003,00000006,000000ff,000016d0,000016d0,00001388,00000000) ret=40652a9f 000f:Ret KERNEL32.CreateNamedPipeA() retval=00000024 ret=40652a9f 000f:Call KERNEL32.CreateEventW(00000000,00000001,00000000,00000000) ret=40652b90 000f:Ret KERNEL32.CreateEventW() retval=00000028 ret=40652b90 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117c08) ret=40658161 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117ab8) ret=40640766 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40640766 000f:Ret rpcrt4.RpcServerUseProtseqEpW() retval=00000000 ret=401c0fe4 000f:Call rpcrt4.RpcServerRegisterIf(401ce0c0,00000000,00000000) ret=401c1060 000f:Call ntdll.RtlAllocateHeap(00110000,00000008,0000003c) ret=4064d1ed 000f:Ret ntdll.RtlAllocateHeap() retval=00117c08 ret=4064d1ed 000f:Ret rpcrt4.RpcServerRegisterIf() retval=00000000 ret=401c1060 000f:Call rpcrt4.RpcServerListen(00000001,000004d2,00000001) ret=401c109a 000f:Call KERNEL32.CreateMutexW(00000000,00000000,00000000) ret=4064b750 000f:Ret KERNEL32.CreateMutexW() retval=0000002c ret=4064b750 000f:Call KERNEL32.CreateEventW(00000000,00000000,00000000,00000000) ret=4064b77f 000f:Ret KERNEL32.CreateEventW() retval=00000030 ret=4064b77f 000f:Call KERNEL32.CreateThread(00000000,00000000,4064b9e0,00117ad0,00000000,00000000) ret=4064b6f8 000f:Ret KERNEL32.CreateThread() retval=00000034 ret=4064b6f8 000f:Call KERNEL32.CloseHandle(00000034) ret=4064b713 000f:Ret KERNEL32.CloseHandle() retval=00000001 ret=4064b713 000f:Call KERNEL32.WaitForSingleObject(0000002c,ffffffff) ret=4064b4cc 000f:Ret KERNEL32.WaitForSingleObject() retval=00000000 ret=4064b4cc 000f:Call KERNEL32.SetEvent(00000020) ret=406505e4 000f:Ret KERNEL32.SetEvent() retval=00000001 ret=406505e4 000f:Call KERNEL32.WaitForSingleObject(00000030,ffffffff) ret=4064b4ea 0010:Call PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) 0010:Ret PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) retval=1 0010:Starting thread proc 0x4064b9e0 (arg=0x117ad0) 0010:Call KERNEL32.ConnectNamedPipe(00000024,00117bd0) ret=40652271 0010:Ret KERNEL32.ConnectNamedPipe() retval=00000000 ret=40652271 0010:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=406523a2 0010:Ret ntdll.RtlAllocateHeap() retval=00117ab8 ret=406523a2 0010:Call KERNEL32.WaitForMultipleObjectsEx(00000002,00117ab8,00000000,ffffffff,00000001) ret=40653064 0010:Ret KERNEL32.WaitForMultipleObjectsEx() retval=00000000 ret=40653064 0010:Call ntdll.RtlReAllocateHeap(00110000,00000000,00117ab8,00000008) ret=406522ea 0010:Ret ntdll.RtlReAllocateHeap() retval=00117ab8 ret=406522ea 0010:Call KERNEL32.SetEvent(00000030) ret=4064ba8e 0010:Ret KERNEL32.SetEvent() retval=00000001 ret=4064ba8e 0010:Call KERNEL32.WaitForMultipleObjectsEx(00000002,00117ab8,00000000,ffffffff,00000001) ret=40653064 000f:Ret KERNEL32.WaitForSingleObject() retval=00000000 ret=4064b4ea 000f:Call KERNEL32.ReleaseMutex(0000002c) ret=4064b4f8 000f:Ret KERNEL32.ReleaseMutex() retval=00000001 ret=4064b4f8 000f:Ret rpcrt4.RpcServerListen() retval=00000000 ret=401c109a 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401c468f 000f:Ret ntdll.RtlAllocateHeap() retval=00117c70 ret=401c468f 000f:Call KERNEL32.CreateMutexW(00000000,00000001,00000000) ret=401c313a 000f:Ret KERNEL32.CreateMutexW() retval=00000034 ret=401c313a 000f:Call KERNEL32.CreateEventW(00000000,00000000,00000000,00000000) ret=401c3ab1 000f:Ret KERNEL32.CreateEventW() retval=00000038 ret=401c3ab1 000f:Call advapi32.RegCreateKeyExW(80000002,401cd880 L"SYSTEM\\CurrentControlSet\\Control\\ServiceCurrent",00000000,00000000,00000001,00000003,00000000,0033fbc8,00000000) ret=401c319f 000f:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c319f 000f:Call advapi32.RegQueryValueExW(0000003c,00000000,00000000,0033fbc4,0033fbc0,0033fbcc) ret=401c353e 000f:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401c353e 000f:Call advapi32.RegSetValueExW(0000003c,00000000,00000000,00000004,0033fbc0,00000004) ret=401c3be5 000f:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c3be5 000f:Call advapi32.RegCloseKey(0000003c) ret=401c3bf3 000f:Ret advapi32.RegCloseKey() retval=00000000 ret=401c3bf3 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,0000004e) ret=401c3593 000f:Ret ntdll.RtlAllocateHeap() retval=00117cf8 ret=401c3593 000f:Call KERNEL32.CreateNamedPipeW(00117cf8 L"\\\\.\\pipe\\net\\NtControlPipe0",00000003,00000000,00000001,00000100,00000100,00002710,00000000) ret=401c31fa 000f:Ret KERNEL32.CreateNamedPipeW() retval=0000003c ret=401c31fa 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117cf8) ret=401c3223 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c3223 000f:Call KERNEL32.ExpandEnvironmentStringsW(00117358 L"C:\\windows\\system32\\drivers\\mountmgr.sys",00000000,00000000) ret=401c3253 000f:Ret KERNEL32.ExpandEnvironmentStringsW() retval=00000029 ret=401c3253 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000052) ret=401c327c 000f:Ret ntdll.RtlAllocateHeap() retval=00117cf8 ret=401c327c 000f:Call KERNEL32.ExpandEnvironmentStringsW(00117358 L"C:\\windows\\system32\\drivers\\mountmgr.sys",00117cf8,00000029) ret=401c32b2 000f:Ret KERNEL32.ExpandEnvironmentStringsW() retval=00000029 ret=401c32b2 000f:Call KERNEL32.GetSystemDirectoryW(0033f964,00000104) ret=401c3924 000f:Ret KERNEL32.GetSystemDirectoryW() retval=00000013 ret=401c3924 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117cf8) ret=401c39a3 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c39a3 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=401c39d8 000f:Ret ntdll.RtlAllocateHeap() retval=00117cf8 ret=401c39d8 000f:Call KERNEL32.lstrcpyW(00117cf8,0033f964 L"C:\\windows\\system32") ret=401c3a01 000f:Ret KERNEL32.lstrcpyW() retval=00117cf8 ret=401c3a01 000f:Call KERNEL32.lstrcatW(00117cf8 L"C:\\windows\\system32",401cd920 L"\\winedevice.exe ") ret=401c3a1c 000f:Ret KERNEL32.lstrcatW() retval=00117cf8 ret=401c3a1c 000f:Call KERNEL32.lstrcatW(00117cf8 L"C:\\windows\\system32\\winedevice.exe ",00117338 L"MountMgr") ret=401c3a34 000f:Ret KERNEL32.lstrcatW() retval=00117cf8 ret=401c3a34 000f:Call KERNEL32.CreateProcessW(00000000,00117cf8 L"C:\\windows\\system32\\winedevice.exe MountMgr",00000000,00000000,00000000,00000000,00000000,00000000,0033fb6c,0033fbb0) ret=401c3362 0012:trace:relay:load_list L"RelayExclude" = L"ntdll.RtlEnterCriticalSection;ntdll.RtlLeaveCriticalSection;kernel32.48;kernel32.49;kernel32.94;kernel32.95;kernel32.96;kernel32.97;kernel32.98;kernel32.TlsGetValue;kernel32.TlsSetValue;kernel32.FlsGetValue;kernel32.FlsSetValue;kernel32.SetLastError" 0012:trace:relay:load_list L"RelayFromExclude" = L"winex11.drv;user32;gdi32;advapi32;kernel32" 0012:Call KERNEL32.__wine_kernel_init() ret=7bc41649 000f:Ret KERNEL32.CreateProcessW() retval=00000001 ret=401c3362 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117cf8) ret=401c338e 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c338e 000f:Call KERNEL32.CloseHandle(0000004c) ret=401c38da 000f:Ret KERNEL32.CloseHandle() retval=00000001 ret=401c38da 000f:Call KERNEL32.ConnectNamedPipe(0000003c,00000000) ret=401c33fa 0012:Call PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_ATTACH,res=0x1) 0012:Ret PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0012:Call PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_ATTACH,res=0x1) 0012:Ret PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0012:Call PE DLL (proc=0x4064ac90,module=0x40610000 L"advapi32.dll",reason=PROCESS_ATTACH,res=0x1) 0012:Ret PE DLL (proc=0x4064ac90,module=0x40610000 L"advapi32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0012:Call PE DLL (proc=0x40691570,module=0x40680000 L"ntoskrnl.exe",reason=PROCESS_ATTACH,res=0x1) 0012:Call KERNEL32.DisableThreadLibraryCalls(40680000) ret=4068f7db 0012:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=4068f7db 0012:Call ntdll.RtlAddVectoredExceptionHandler(00000001,4068d210) ret=4068f7f4 0012:Ret ntdll.RtlAddVectoredExceptionHandler() retval=00114f58 ret=4068f7f4 0012:Call ntdll.NtGetTickCount() ret=4068f736 0012:Ret ntdll.NtGetTickCount() retval=000001db ret=4068f736 0012:Ret PE DLL (proc=0x40691570,module=0x40680000 L"ntoskrnl.exe",reason=PROCESS_ATTACH,res=0x1) retval=1 0012:Starting process L"C:\\windows\\system32\\winedevice.exe" (entryproc=0x401c1030) 0012:Call advapi32.StartServiceCtrlDispatcherW(0033fe90) ret=401c0152 0013:Starting thread proc 0x40641c50 (arg=0x0) 0013:Call PE DLL (proc=0x4071d2f0,module=0x406d0000 L"rpcrt4.dll",reason=PROCESS_ATTACH,res=0x0) 0013:Ret PE DLL (proc=0x4071d2f0,module=0x406d0000 L"rpcrt4.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 0013:Call rpcrt4.NdrClientInitializeNew(0043f4d4,0043f3f0,406536c0,0000000f) ret=4064a3f3 0013:Ret rpcrt4.NdrClientInitializeNew() retval=4063fe20 ret=4064a3f3 0013:Call rpcrt4.RpcStringBindingComposeW(00000000,0043f316 L"ncacn_np",00000000,0043f2fc L"\\pipe\\svcctl",00000000,0043f32c) ret=40640375 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=40704c25 0013:Ret ntdll.RtlAllocateHeap() retval=00118fb8 ret=40704c25 0013:Ret rpcrt4.RpcStringBindingComposeW() retval=00000000 ret=40640375 0013:Call rpcrt4.RpcBindingFromStringBindingW(00118fb8 L"ncacn_np:[\\\\pipe\\\\svcctl]",0043f328) ret=4064038e 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=40702c62 0013:Ret ntdll.RtlAllocateHeap() retval=001190d8 ret=40702c62 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000002) ret=40702c62 0013:Ret ntdll.RtlAllocateHeap() retval=00119018 ret=40702c62 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=40702c62 0013:Ret ntdll.RtlAllocateHeap() retval=00119030 ret=40702c62 0013:Call ntdll.RtlAllocateHeap(00110000,00000008,00000044) ret=40702d21 0013:Ret ntdll.RtlAllocateHeap() retval=00119058 ret=40702d21 0013:Call KERNEL32.WideCharToMultiByte(00000000,00000000,001190d8 L"ncacn_np",ffffffff,00000000,00000000,00000000,00000000) ret=4070469c 0013:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=4070469c 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=407046be 0013:Ret ntdll.RtlAllocateHeap() retval=0011a260 ret=407046be 0013:Call KERNEL32.WideCharToMultiByte(00000000,00000000,001190d8 L"ncacn_np",ffffffff,0011a260,00000009,00000000,00000000) ret=407046fb 0013:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=407046fb 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=40703766 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40703766 0013:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00119018 L"",ffffffff,00000000,00000000,00000000,00000000) ret=4070469c 0013:Ret KERNEL32.WideCharToMultiByte() retval=00000001 ret=4070469c 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=407046be 0013:Ret ntdll.RtlAllocateHeap() retval=0011a278 ret=407046be 0013:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00119018 L"",ffffffff,0011a278,00000001,00000000,00000000) ret=407046fb 0013:Ret KERNEL32.WideCharToMultiByte() retval=00000001 ret=407046fb 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=40703766 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40703766 0013:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00119030 L"\\pipe\\svcctl",ffffffff,00000000,00000000,00000000,00000000) ret=4070469c 0013:Ret KERNEL32.WideCharToMultiByte() retval=0000000d ret=4070469c 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=407046be 0013:Ret ntdll.RtlAllocateHeap() retval=0011a290 ret=407046be 0013:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00119030 L"\\pipe\\svcctl",ffffffff,0011a290,0000000d,00000000,00000000) ret=407046fb 0013:Ret KERNEL32.WideCharToMultiByte() retval=0000000d ret=407046fb 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=40707255 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40707255 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=40701011 0013:Ret ntdll.RtlAllocateHeap() retval=0011a2a8 ret=40701011 0013:Call KERNEL32.InitializeCriticalSection(0011a2d8) ret=40701047 0013:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=40701047 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=0011a330 ret=40705260 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=0011a348 ret=40705260 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=0011a360 ret=40705260 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4071aff3 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071aff3 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00119030) ret=4071aff3 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071aff3 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00119018) ret=4071aff3 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071aff3 0013:Call ntdll.RtlFreeHeap(00110000,00000000,001190d8) ret=4071aff3 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071aff3 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4071aff3 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071aff3 0013:Ret rpcrt4.RpcBindingFromStringBindingW() retval=00000000 ret=4064038e 0013:Call rpcrt4.RpcStringFreeW(0043f32c) ret=4064039b 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00118fb8) ret=4071aff3 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071aff3 0013:Ret rpcrt4.RpcStringFreeW() retval=00000000 ret=4064039b 0013:Call rpcrt4.NdrPointerBufferSize(0043f3f0,00000000,40652bb0) ret=4064a429 0013:Ret rpcrt4.NdrPointerBufferSize() retval=00000012 ret=4064a429 0013:Call rpcrt4.NdrPointerBufferSize(0043f3f0,00000000,40652c46) ret=4064a44a 0013:Ret rpcrt4.NdrPointerBufferSize() retval=00000012 ret=4064a44a 0013:Call rpcrt4.NdrGetBuffer(0043f3f0,00000010,00119058) ret=4064a466 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=4071b121 0013:Ret ntdll.RtlAllocateHeap() retval=001190d8 ret=4071b121 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000090) ret=40715bc7 0013:Ret ntdll.RtlAllocateHeap() retval=00118fb8 ret=40715bc7 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=0011a378 ret=40705260 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=0011a390 ret=40705260 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=4071b121 0013:Ret ntdll.RtlAllocateHeap() retval=0011a3a8 ret=4071b121 0013:Call KERNEL32.CreateFileA(0011a3a8 "\\\\.\\pipe\\svcctl",c0000000,00000000,00000000,00000003,00000000,00000000) ret=40714a32 0013:Ret KERNEL32.CreateFileA() retval=00000020 ret=40714a32 0013:Call KERNEL32.SetNamedPipeHandleState(00000020,0043f02c,00000000,00000000) ret=40714b42 0013:Ret KERNEL32.SetNamedPipeHandleState() retval=00000000 ret=40714b42 0013:Call KERNEL32.CreateEventW(00000000,00000001,00000000,00000000) ret=40714b69 0013:Ret KERNEL32.CreateEventW() retval=00000024 ret=40714b69 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a3a8) ret=4071b161 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071b161 0013:Call ntdll.RtlAllocateHeap(00110000,00000008,00000048) ret=4070c059 0013:Ret ntdll.RtlAllocateHeap() retval=0011a3a8 ret=4070c059 0013:Call ntdll.RtlAllocateHeap(00110000,00000008,00000030) ret=4071a625 0013:Ret ntdll.RtlAllocateHeap() retval=0011a3f8 ret=4071a625 0013:Call KERNEL32.InitializeCriticalSection(0011a400) ret=4071a639 0013:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=4071a639 0013:Call ntdll.RtlAllocateHeap(00110000,00000008,00000048) ret=4070d461 0013:Ret ntdll.RtlAllocateHeap() retval=0011a458 ret=4070d461 0013:Call KERNEL32.WriteFile(00000020,0011a458,00000048,0043ef8c,00000000) ret=40714c7f 0013:Ret KERNEL32.WriteFile() retval=00000001 ret=40714c7f 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a458) ret=4070d553 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070d553 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a3a8) ret=4070b546 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070b546 0013:Call KERNEL32.ReadFile(00000020,0043efa0,00000010,0043ef3c,00000000) ret=40714f1f 0010:Ret KERNEL32.WaitForMultipleObjectsEx() retval=00000001 ret=40653064 0010:Call ntdll.RtlAllocateHeap(00110000,00000000,00000090) ret=40652bc7 0010:Ret ntdll.RtlAllocateHeap() retval=00117d18 ret=40652bc7 0010:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=40642260 0010:Ret ntdll.RtlAllocateHeap() retval=00117db0 ret=40642260 0010:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=40658121 0010:Ret ntdll.RtlAllocateHeap() retval=00117dc8 ret=40658121 0010:Call KERNEL32.CreateNamedPipeA(00117dc8 "\\\\.\\pipe\\svcctl",00000003,00000006,000000ff,000016d0,000016d0,00001388,00000000) ret=40652a9f 0010:Ret KERNEL32.CreateNamedPipeA() retval=00000044 ret=40652a9f 0010:Call KERNEL32.CreateEventW(00000000,00000001,00000000,00000000) ret=40652b90 0010:Ret KERNEL32.CreateEventW() retval=0000004c ret=40652b90 0010:Call ntdll.RtlFreeHeap(00110000,00000000,00117dc8) ret=40658161 0010:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 0010:Call KERNEL32.CreateThread(00000000,00000000,4064e240,00117d18,00000000,00000000) ret=4064c3aa 0010:Ret KERNEL32.CreateThread() retval=00000050 ret=4064c3aa 0010:Call KERNEL32.CloseHandle(00000050) ret=4064c3bb 0014:Call PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) 0014:Ret PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) retval=1 0014:Starting thread proc 0x4064e240 (arg=0x117d18) 0014:Call ntdll.RtlAllocateHeap(00110000,00000008,0000002c) ret=4064e406 0014:Ret ntdll.RtlAllocateHeap() retval=00117dc8 ret=4064e406 0014:Call ntdll.RtlAllocateHeap(00110000,00000008,00000030) ret=40657625 0014:Ret ntdll.RtlAllocateHeap() retval=00117e00 ret=40657625 0014:Call KERNEL32.InitializeCriticalSection(00117e08) ret=40657639 0014:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=40657639 0014:Call KERNEL32.ReadFile(00000024,0053f540,00000010,0053f4dc,00000000) ret=40651f1f 0010:Ret KERNEL32.CloseHandle() retval=00000001 ret=4064c3bb 0010:Call KERNEL32.ConnectNamedPipe(00000044,00117bd0) ret=40652271 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=40649629 0014:Ret ntdll.RtlAllocateHeap() retval=00117e80 ret=40649629 0014:Call KERNEL32.ReadFile(00000024,00117e90,0000000c,0053f4dc,00000000) ret=40651f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002c) ret=406496bc 0014:Ret ntdll.RtlAllocateHeap() retval=00117ea8 ret=406496bc 0014:Call KERNEL32.ReadFile(00000024,00117ea8,0000002c,0053f4dc,00000000) ret=40651f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002c) ret=40658121 0014:Ret ntdll.RtlAllocateHeap() retval=00117ee0 ret=40658121 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00117ea8) ret=40649b87 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40649b87 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4064dc0b 0014:Ret ntdll.RtlAllocateHeap() retval=00117ea8 ret=4064dc0b 0014:Call ntdll.RtlAllocateHeap(00110000,00000008,00000044) ret=4063fd21 0014:Ret ntdll.RtlAllocateHeap() retval=00117f18 ret=4063fd21 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=40642260 0014:Ret ntdll.RtlAllocateHeap() retval=00117f68 ret=40642260 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=40642260 0014:Ret ntdll.RtlAllocateHeap() retval=00117f80 ret=40642260 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=4063e011 0014:Ret ntdll.RtlAllocateHeap() retval=00117f98 ret=4063e011 0014:Call KERNEL32.InitializeCriticalSection(00117fc8) ret=4063e047 0014:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=4063e047 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=40642260 0014:Ret ntdll.RtlAllocateHeap() retval=00118020 ret=40642260 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=40642260 0014:Ret ntdll.RtlAllocateHeap() retval=00118038 ret=40642260 0014:Call ntdll.RtlAllocateHeap(00110000,00000008,00000044) ret=4064adeb 0014:Ret ntdll.RtlAllocateHeap() retval=00118050 ret=4064adeb 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00117ea8) ret=4064dfe8 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064dfe8 0014:Call ntdll.RtlAllocateHeap(00110000,00000008,00000044) ret=4064a461 0014:Ret ntdll.RtlAllocateHeap() retval=001180a0 ret=4064a461 0014:Call KERNEL32.WriteFile(00000024,001180a0,00000044,0053f4dc,00000000) ret=40651c7f 0014:Ret KERNEL32.WriteFile() retval=00000001 ret=40651c7f 0014:Call ntdll.RtlFreeHeap(00110000,00000000,001180a0) ret=4064a553 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064a553 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00118050) ret=40648546 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40648546 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00117ee0) ret=40658161 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00117e80) ret=40648546 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40648546 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00117dc8) ret=4064e3b6 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064e3b6 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4064e3da 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064e3da 0014:Call ntdll.RtlAllocateHeap(00110000,00000008,0000002c) ret=4064e406 0014:Ret ntdll.RtlAllocateHeap() retval=00117dc8 ret=4064e406 0014:Call KERNEL32.ReadFile(00000024,0053f540,00000010,0053f4dc,00000000) ret=40651f1f 0013:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4070c629 0013:Ret ntdll.RtlAllocateHeap() retval=0011a3a8 ret=4070c629 0013:Call KERNEL32.ReadFile(00000020,0011a3b8,00000008,0043ef3c,00000000) ret=40714f1f 0013:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002c) ret=4070c6bc 0013:Ret ntdll.RtlAllocateHeap() retval=0011a458 ret=4070c6bc 0013:Call KERNEL32.ReadFile(00000020,0011a458,0000002c,0043ef3c,00000000) ret=40714f1f 0013:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002c) ret=4071b121 0013:Ret ntdll.RtlAllocateHeap() retval=0011a490 ret=4071b121 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a458) ret=4070cb87 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070cb87 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a490) ret=4071b161 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071b161 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a3a8) ret=4070b546 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070b546 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=40701cf6 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40701cf6 0013:Ret rpcrt4.NdrGetBuffer() retval=001190d8 ret=4064a466 0013:Call rpcrt4.NdrPointerMarshall(0043f3f0,00000000,40652bb0) ret=4064a484 0013:Ret rpcrt4.NdrPointerMarshall() retval=00000000 ret=4064a484 0013:Call rpcrt4.NdrPointerMarshall(0043f3f0,00000000,40652c46) ret=4064a4a5 0013:Ret rpcrt4.NdrPointerMarshall() retval=00000000 ret=4064a4a5 0013:Call rpcrt4.NdrSendReceive(0043f3f0,001190e4) ret=4064a4fb 0013:Call ntdll.RtlAllocateHeap(00110000,00000008,00000018) ret=4070d991 0013:Ret ntdll.RtlAllocateHeap() retval=0011a3a8 ret=4070d991 0013:Call ntdll.RtlAllocateHeap(00110000,00000008,00000024) ret=4070d461 0013:Ret ntdll.RtlAllocateHeap() retval=0011a3c8 ret=4070d461 0013:Call KERNEL32.WriteFile(00000020,0011a3c8,00000024,0043f09c,00000000) ret=40714c7f 0013:Ret KERNEL32.WriteFile() retval=00000001 ret=40714c7f 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a3c8) ret=4070d553 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070d553 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a3a8) ret=4070b546 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070b546 0013:Call KERNEL32.ReadFile(00000020,0043f090,00000010,0043f02c,00000000) ret=40714f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=40649629 0014:Ret ntdll.RtlAllocateHeap() retval=00117e80 ret=40649629 0014:Call KERNEL32.ReadFile(00000024,00117e90,00000008,0053f4dc,00000000) ret=40651f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=406496bc 0014:Ret ntdll.RtlAllocateHeap() retval=00117ea0 ret=406496bc 0014:Call KERNEL32.ReadFile(00000024,00117ea0,0000000c,0053f4dc,00000000) ret=40651f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=40658121 0014:Ret ntdll.RtlAllocateHeap() retval=00117eb8 ret=40658121 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00117ea0) ret=40649b87 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40649b87 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=4064e2fe 0014:Ret ntdll.RtlAllocateHeap() retval=00117ed0 ret=4064e2fe 0014:Call KERNEL32.QueueUserWorkItem(4064f780,00117ed0,00000010) ret=4064e33c 0010:Ret KERNEL32.ConnectNamedPipe() retval=00000000 ret=40652271 0010:Call ntdll.RtlReAllocateHeap(00110000,00000000,00117ab8,00000008) ret=406522ea 0010:Ret ntdll.RtlReAllocateHeap() retval=00117ab8 ret=406522ea 0010:Call KERNEL32.WaitForMultipleObjectsEx(00000002,00117ab8,00000000,ffffffff,00000001) ret=40653064 0010:Ret KERNEL32.WaitForMultipleObjectsEx() retval=000000c0 ret=40653064 0010:Call KERNEL32.WaitForMultipleObjectsEx(00000002,00117ab8,00000000,ffffffff,00000001) ret=40653064 0014:Ret KERNEL32.QueueUserWorkItem() retval=00000001 ret=4064e33c 0014:Call ntdll.RtlAllocateHeap(00110000,00000008,0000002c) ret=4064e406 0014:Ret ntdll.RtlAllocateHeap() retval=00118050 ret=4064e406 0014:Call KERNEL32.ReadFile(00000024,0053f540,00000010,0053f4dc,00000000) ret=40651f1f 0015:Call PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) 0015:Ret PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) retval=1 0015:Starting thread proc 0x7bc6f070 (arg=0x0) 0015:Call ntdll.RtlAllocateHeap(00110000,00000008,00000030) ret=40657625 0015:Ret ntdll.RtlAllocateHeap() retval=00118088 ret=40657625 0015:Call KERNEL32.InitializeCriticalSection(00118090) ret=40657639 0015:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=40657639 0015:Call rpcrt4.NdrServerInitializeNew(00117dc8,0063f3c0,401ce060) ret=401c9ab6 0015:Ret rpcrt4.NdrServerInitializeNew() retval=00000000 ret=401c9ab6 0015:Call rpcrt4.NdrPointerUnmarshall(0063f3c0,0063f4a0,401cdb70,00000000) ret=401c9bb1 0015:Ret rpcrt4.NdrPointerUnmarshall() retval=00000000 ret=401c9bb1 0015:Call rpcrt4.NdrPointerUnmarshall(0063f3c0,0063f4a4,401cdc06,00000000) ret=401c9bda 0015:Ret rpcrt4.NdrPointerUnmarshall() retval=00000000 ret=401c9bda 0015:Call rpcrt4.NdrContextHandleInitialize(0063f3c0,401cdb78) ret=401c9c3a 0015:Call ntdll.RtlAllocateHeap(00110000,00000008,00000060) ret=4063df63 0015:Ret ntdll.RtlAllocateHeap() retval=001180c0 ret=4063df63 0015:Call ntdll.RtlInitializeResource(001180e4) ret=4063df82 0015:Ret ntdll.RtlInitializeResource() retval=00000000 ret=4063df82 0015:Call ntdll.RtlAcquireResourceExclusive(001180e4,00000001) ret=4063df9c 0015:Ret ntdll.RtlAcquireResourceExclusive() retval=00000001 ret=4063df9c 0015:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=406581a3 0015:Ret ntdll.RtlAllocateHeap() retval=00117ea0 ret=406581a3 0015:Ret rpcrt4.NdrContextHandleInitialize() retval=001180c0 ret=401c9c3a 0015:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401c2268 0015:Ret ntdll.RtlAllocateHeap() retval=00117c50 ret=401c2268 0015:Call ntdll.RtlMapGenericMask(00117c54,401cd6f0) ret=401c22a7 0015:Ret ntdll.RtlMapGenericMask() retval=00000001 ret=401c22a7 0015:Call rpcrt4.I_RpcGetBuffer(00117dc8) ret=401c9c82 0015:Call ntdll.RtlAllocateHeap(00110000,00000000,00000020) ret=40658121 0015:Ret ntdll.RtlAllocateHeap() retval=00118150 ret=40658121 0015:Ret rpcrt4.I_RpcGetBuffer() retval=00000000 ret=401c9c82 0015:Call rpcrt4.NdrServerContextNewMarshall(0063f3c0,001180c0,401c0d50,401cdb78) ret=401c9cca 0015:Call advapi32.SystemFunction036(001180d4,00000010) ret=40658ba1 0015:Ret advapi32.SystemFunction036() retval=00000001 ret=40658ba1 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117ea0) ret=40658223 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658223 0015:Call ntdll.RtlReleaseResource(001180e4) ret=4063e5ab 0015:Ret ntdll.RtlReleaseResource() retval=00000000 ret=4063e5ab 0015:Ret rpcrt4.NdrServerContextNewMarshall() retval=00000001 ret=401c9cca 0015:Call rpcrt4.NdrPointerFree(0063f3c0,00000000,401cdb70) ret=401c5b2c 0015:Ret rpcrt4.NdrPointerFree() retval=00000000 ret=401c5b2c 0015:Call rpcrt4.NdrPointerFree(0063f3c0,00000000,401cdc06) ret=401c5b50 0015:Ret rpcrt4.NdrPointerFree() retval=00000000 ret=401c5b50 0015:Call ntdll.RtlAllocateHeap(00110000,00000008,00000018) ret=40648f88 0015:Ret ntdll.RtlAllocateHeap() retval=00118178 ret=40648f88 0015:Call ntdll.RtlAllocateHeap(00110000,00000008,00000030) ret=4064a461 0015:Ret ntdll.RtlAllocateHeap() retval=00118198 ret=4064a461 0015:Call KERNEL32.WriteFile(00000024,00118198,00000030,0063f3ec,00000000) ret=40651c7f 0015:Ret KERNEL32.WriteFile() retval=00000001 ret=40651c7f 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118198) ret=4064a553 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064a553 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118178) ret=40648546 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40648546 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117eb8) ret=40658161 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118150) ret=40658161 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117e80) ret=40648546 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40648546 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117dc8) ret=4064f836 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f836 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4064f859 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f859 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117ed0) ret=4064f879 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f879 0013:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4070c629 0013:Ret ntdll.RtlAllocateHeap() retval=0011a3a8 ret=4070c629 0013:Call KERNEL32.ReadFile(00000020,0011a3b8,00000008,0043f02c,00000000) ret=40714f1f 0013:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4070c6bc 0013:Ret ntdll.RtlAllocateHeap() retval=0011a3c8 ret=4070c6bc 0013:Call KERNEL32.ReadFile(00000020,0011a3c8,00000018,0043f02c,00000000) ret=40714f1f 0013:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4071b121 0013:Ret ntdll.RtlAllocateHeap() retval=0011a458 ret=4071b121 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4070cb64 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070cb64 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a3c8) ret=4070cb87 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070cb87 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a3a8) ret=4070b546 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070b546 0013:Call ntdll.RtlFreeHeap(00110000,00000000,001190d8) ret=4071b161 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071b161 0013:Ret rpcrt4.NdrSendReceive() retval=00000000 ret=4064a4fb 0013:Call rpcrt4.NdrClientContextUnmarshall(0043f3f0,0043f5bc,00119058) ret=4064a550 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000024) ret=406e3398 0013:Ret ntdll.RtlAllocateHeap() retval=001190d8 ret=406e3398 0013:Call ntdll.RtlAllocateHeap(00110000,00000008,00000044) ret=40702d21 0013:Ret ntdll.RtlAllocateHeap() retval=0011a3a8 ret=40702d21 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=0011a478 ret=40705260 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=0011a490 ret=40705260 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=0011a4a8 ret=40705260 0013:Ret rpcrt4.NdrClientContextUnmarshall() retval=00000000 ret=4064a550 0013:Call rpcrt4.NdrFreeBuffer(0043f3f0) ret=40645c85 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a458) ret=4071b161 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071b161 0013:Ret rpcrt4.NdrFreeBuffer() retval=00000000 ret=40645c85 0013:Call rpcrt4.RpcBindingFree(0043f344) ret=4064028c 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a290) ret=40703766 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40703766 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a278) ret=40703766 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40703766 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a260) ret=40703766 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40703766 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=40703d1f 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40703d1f 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00119058) ret=40703d5d 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40703d5d 0013:Ret rpcrt4.RpcBindingFree() retval=00000000 ret=4064028c 000f:Ret KERNEL32.ConnectNamedPipe() retval=00000001 ret=401c33fa 000f:Call ntdll.RtlAllocateHeap(00110000,00000000,00000036) ret=401c3661 000f:Ret ntdll.RtlAllocateHeap() retval=00117e80 ret=401c3661 000f:Call KERNEL32.WriteFile(0000003c,00117e80,00000036,0033fbc4,00000000) ret=401c3788 0013:Call rpcrt4.NdrClientInitializeNew(0043f4e4,0043f404,406536c0,00000010) ret=4064a17b 0013:Ret rpcrt4.NdrClientInitializeNew() retval=4063fe20 ret=4064a17b 0013:Call rpcrt4.NDRCContextBinding(001190d8) ret=4064a18e 0013:Ret rpcrt4.NDRCContextBinding() retval=0011a3a8 ret=4064a18e 0013:Call rpcrt4.NdrConformantStringBufferSize(0043f404,0011a260,40652bc2) ret=4064a1bc 0013:Ret rpcrt4.NdrConformantStringBufferSize() retval=00000012 ret=4064a1bc 0013:Call rpcrt4.NdrGetBuffer(0043f404,0000003e,0011a3a8) ret=4064a1d8 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003e) ret=4071b121 0013:Ret ntdll.RtlAllocateHeap() retval=00119058 ret=4071b121 0013:Ret rpcrt4.NdrGetBuffer() retval=00119058 ret=4064a1d8 0013:Call rpcrt4.NdrClientContextMarshall(0043f404,001190d8,00000000) ret=4064a1ef 0013:Ret rpcrt4.NdrClientContextMarshall() retval=00000000 ret=4064a1ef 0013:Call rpcrt4.NdrConformantStringMarshall(0043f404,0011a260,40652bc2) ret=4064a210 0013:Ret rpcrt4.NdrConformantStringMarshall() retval=00000000 ret=4064a210 0013:Call rpcrt4.NdrSendReceive(0043f404,00119090) ret=4064a266 0013:Call ntdll.RtlAllocateHeap(00110000,00000008,00000018) ret=4070d991 0013:Ret ntdll.RtlAllocateHeap() retval=001190a0 ret=4070d991 0013:Call ntdll.RtlAllocateHeap(00110000,00000008,00000050) ret=4070d461 0013:Ret ntdll.RtlAllocateHeap() retval=0011a4c0 ret=4070d461 0013:Call KERNEL32.WriteFile(00000020,0011a4c0,00000050,0043f0bc,00000000) ret=40714c7f 0013:Ret KERNEL32.WriteFile() retval=00000001 ret=40714c7f 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a4c0) ret=4070d553 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070d553 0013:Call ntdll.RtlFreeHeap(00110000,00000000,001190a0) ret=4070b546 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070b546 0013:Call KERNEL32.ReadFile(00000020,0043f0b0,00000010,0043f04c,00000000) ret=40714f1f 000f:Ret KERNEL32.WriteFile() retval=00000001 ret=401c3788 000f:Call KERNEL32.ReadFile(0000003c,0033fbc0,00000004,0033fbc4,00000000) ret=401c3b3c 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=40649629 0014:Ret ntdll.RtlAllocateHeap() retval=00117cf8 ret=40649629 0014:Call KERNEL32.ReadFile(00000024,00117d08,00000008,0053f4dc,00000000) ret=40651f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000038) ret=406496bc 0014:Ret ntdll.RtlAllocateHeap() retval=00118150 ret=406496bc 0014:Call KERNEL32.ReadFile(00000024,00118150,00000038,0053f4dc,00000000) ret=40651f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000038) ret=40658121 0014:Ret ntdll.RtlAllocateHeap() retval=00118190 ret=40658121 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00118150) ret=40649b87 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40649b87 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=4064e2fe 0014:Ret ntdll.RtlAllocateHeap() retval=00117ec0 ret=4064e2fe 0014:Call KERNEL32.QueueUserWorkItem(4064f780,00117ec0,00000010) ret=4064e33c 0015:Call rpcrt4.NdrServerInitializeNew(00118050,0063f3c0,401ce060) ret=401c9776 0015:Ret rpcrt4.NdrServerInitializeNew() retval=00000000 ret=401c9776 0015:Call rpcrt4.NdrServerContextNewUnmarshall(0063f3c0,401cdb7c) ret=401c9862 0015:Call ntdll.RtlAcquireResourceExclusive(001180e4,00000001) ret=4063f2b9 0015:Ret ntdll.RtlAcquireResourceExclusive() retval=00000001 ret=4063f2b9 0015:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=406581a3 0015:Ret ntdll.RtlAllocateHeap() retval=00118150 ret=406581a3 0015:Ret rpcrt4.NdrServerContextNewUnmarshall() retval=001180c0 ret=401c9862 0015:Call rpcrt4.NdrConformantStringUnmarshall(0063f3c0,0063f4a4,401cdb82,00000000) ret=401c988e 0015:Ret rpcrt4.NdrConformantStringUnmarshall() retval=00000000 ret=401c988e 0015:Call rpcrt4.NdrContextHandleInitialize(0063f3c0,401cdb84) ret=401c98ee 0015:Call ntdll.RtlAllocateHeap(00110000,00000008,00000060) ret=4063df63 0015:Ret ntdll.RtlAllocateHeap() retval=001181d0 ret=4063df63 0015:Call ntdll.RtlInitializeResource(001181f4) ret=4063df82 0015:Ret ntdll.RtlInitializeResource() retval=00000000 ret=4063df82 0015:Call ntdll.RtlAcquireResourceExclusive(001181f4,00000001) ret=4063df9c 0015:Ret ntdll.RtlAcquireResourceExclusive() retval=00000001 ret=4063df9c 0015:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=406581a3 0015:Ret ntdll.RtlAllocateHeap() retval=00117dc8 ret=406581a3 0015:Ret rpcrt4.NdrContextHandleInitialize() retval=001181d0 ret=401c98ee 0015:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401c1d1e 0015:Ret ntdll.RtlAllocateHeap() retval=00117de0 ret=401c1d1e 0015:Call ntdll.RtlMapGenericMask(00117de4,401cd6e0) ret=401c1d61 0015:Ret ntdll.RtlMapGenericMask() retval=00008000 ret=401c1d61 0015:Call rpcrt4.I_RpcGetBuffer(00118050) ret=401c9939 0015:Call ntdll.RtlAllocateHeap(00110000,00000000,00000020) ret=40658121 0015:Ret ntdll.RtlAllocateHeap() retval=00118238 ret=40658121 0015:Ret rpcrt4.I_RpcGetBuffer() retval=00000000 ret=401c9939 0015:Call rpcrt4.NdrServerContextNewMarshall(0063f3c0,001181d0,401c0d50,401cdb84) ret=401c9981 0015:Call advapi32.SystemFunction036(001181e4,00000010) ret=40658ba1 0015:Ret advapi32.SystemFunction036() retval=00000001 ret=40658ba1 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117dc8) ret=40658223 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658223 0015:Call ntdll.RtlReleaseResource(001181f4) ret=4063e5ab 0015:Ret ntdll.RtlReleaseResource() retval=00000000 ret=4063e5ab 0015:Ret rpcrt4.NdrServerContextNewMarshall() retval=00000001 ret=401c9981 0015:Call rpcrt4.NdrPointerFree(0063f3c0,001181b0,401cdb80) ret=401c5ae5 0015:Ret rpcrt4.NdrPointerFree() retval=001181b0 ret=401c5ae5 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118150) ret=406576dc 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=406576dc 0015:Call ntdll.RtlReleaseResource(001180e4) ret=4063e5ab 0015:Ret ntdll.RtlReleaseResource() retval=00000000 ret=4063e5ab 0015:Call ntdll.RtlAllocateHeap(00110000,00000008,00000018) ret=40648f88 0015:Ret ntdll.RtlAllocateHeap() retval=00118260 ret=40648f88 0015:Call ntdll.RtlAllocateHeap(00110000,00000008,00000030) ret=4064a461 0015:Ret ntdll.RtlAllocateHeap() retval=00118280 ret=4064a461 0015:Call KERNEL32.WriteFile(00000024,00118280,00000030,0063f3ec,00000000) ret=40651c7f 0015:Ret KERNEL32.WriteFile() retval=00000001 ret=40651c7f 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118280) ret=4064a553 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064a553 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118260) ret=40648546 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40648546 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118190) ret=40658161 629 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 629 0013:Call KERNEL32.ReadFile(00000020,001190b0,00000008,0043f04c,00000000) ret=40714f1f 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117cf8) ret=40648546 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40648546 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118050) ret=4064f836 6bc 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f836 6bc 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4064f859 000) ret=40714f1f 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f859 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117ec0) ret=4064f879 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f879 ret=4071b121 0013:Ret ntdll.RtlAllocateHeap() retval=0011a4c0 ret=4071b121 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4070cb64 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070cb64 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a458) ret=4070cb87 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070cb87 0013:Call ntdll.RtlFreeHeap(00110000,00000000,001190a0) ret=4070b546 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070b546 0013:Call ntdll.RtlFreeHeap(00110000,00000000,00119058) ret=4071b161 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071b161 0013:Ret rpcrt4.NdrSendReceive() retval=00000000 ret=4064a266 0013:Call rpcrt4.NdrClientContextUnmarshall(0043f404,0043f5cc,0011a3a8) ret=4064a2bb 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000024) ret=406e3398 0013:Ret ntdll.RtlAllocateHeap() retval=00119058 ret=406e3398 0013:Call ntdll.RtlAllocateHeap(00110000,00000008,00000044) ret=40702d21 0013:Ret ntdll.RtlAllocateHeap() retval=0011a4e0 ret=40702d21 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=0011a458 ret=40705260 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=00119088 ret=40705260 0013:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=40705260 0013:Ret ntdll.RtlAllocateHeap() retval=001190a0 ret=40705260 0013:Ret rpcrt4.NdrClientContextUnmarshall() retval=00000000 ret=4064a2bb 0013:Call rpcrt4.NdrFreeBuffer(0043f404) ret=406459f4 0013:Call ntdll.RtlFreeHeap(00110000,00000000,0011a4c0) ret=4071b161 0013:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071b161 0013:Ret rpcrt4.NdrFreeBuffer() retval=00000000 ret=406459f4 0014:Ret KERNEL32.QueueUserWorkItem() retval=00000001 ret=4064e33c 0014:Call ntdll.RtlAllocateHeap(00110000,00000008,0000002c) ret=4064e406 0014:Ret ntdll.RtlAllocateHeap() retval=00118050 ret=4064e406 0014:Call KERNEL32.ReadFile(00000024,0053f540,00000010,0053f4dc,00000000) ret=40651f1f 0016:Call PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) 0016:Ret PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) retval=1 0016:Starting thread proc 0x7bc6f070 (arg=0x0) 0017:Call PE DLL (proc=0x4071d2f0,module=0x406d0000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) 0017:Ret PE DLL (proc=0x4071d2f0,module=0x406d0000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) retval=1 0017:Starting thread proc 0x40642840 (arg=0x118f80) 0017:Call KERNEL32.CreateEventW(00000000,00000001,00000000,00000000) ret=401c067a 0017:Ret KERNEL32.CreateEventW() retval=00000034 ret=401c067a 0017:Call advapi32.RegisterServiceCtrlHandlerExW(00114d02 L"MountMgr",401c0490,00000000) ret=401c06a3 0017:Ret advapi32.RegisterServiceCtrlHandlerExW() retval=00119058 ret=401c06a3 0017:Call advapi32.SetServiceStatus(00119058,0053f5f4) ret=401c06fa 0017:Call rpcrt4.NdrClientInitializeNew(0053f1d4,0053f0f4,406536c0,00000007) ret=40647540 0017:Ret rpcrt4.NdrClientInitializeNew() retval=4063fe20 ret=40647540 0017:Call rpcrt4.NDRCContextBinding(00119058) ret=40647553 0017:Ret rpcrt4.NDRCContextBinding() retval=0011a4e0 ret=40647553 0017:Call rpcrt4.NdrGetBuffer(0053f0f4,00000038,0011a4e0) ret=40647577 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000038) ret=4071b121 0017:Ret ntdll.RtlAllocateHeap() retval=0011a530 ret=4071b121 0017:Ret rpcrt4.NdrGetBuffer() retval=0011a530 ret=40647577 0017:Call rpcrt4.NdrClientContextMarshall(0053f0f4,00119058,00000000) ret=4064758e 0017:Ret rpcrt4.NdrClientContextMarshall() retval=00000000 ret=4064758e 0017:Call rpcrt4.NdrSimpleStructMarshall(0053f0f4,0053f5f4,40652b2c) ret=406475ad 0017:Ret rpcrt4.NdrSimpleStructMarshall() retval=00000000 ret=406475ad 0017:Call rpcrt4.NdrSendReceive(0053f0f4,0011a560) ret=406475c2 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000018) ret=4070d991 0017:Ret ntdll.RtlAllocateHeap() retval=0011a278 ret=4070d991 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000030) ret=4071a625 0017:Ret ntdll.RtlAllocateHeap() retval=0011a570 ret=4071a625 0017:Call KERNEL32.InitializeCriticalSection(0011a578) ret=4071a639 0017:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=4071a639 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000048) ret=4070d461 0017:Ret ntdll.RtlAllocateHeap() retval=0011a5d0 ret=4070d461 0017:Call KERNEL32.WriteFile(00000020,0011a5d0,00000048,0053edac,00000000) ret=40714c7f 0017:Ret KERNEL32.WriteFile() retval=00000001 ret=40714c7f 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011a5d0) ret=4070d553 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070d553 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011a278) ret=4070b546 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070b546 0017:Call KERNEL32.ReadFile(00000020,0053eda0,00000010,0053ed3c,00000000) ret=40714f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=40649629 0014:Ret ntdll.RtlAllocateHeap() retval=00117cf8 ret=40649629 0014:Call KERNEL32.ReadFile(00000024,00117d08,00000008,0053f4dc,00000000) ret=40651f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=406496bc 0014:Ret ntdll.RtlAllocateHeap() retval=00118190 ret=406496bc 0014:Call KERNEL32.ReadFile(00000024,00118190,00000030,0053f4dc,00000000) ret=40651f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=40658121 0014:Ret ntdll.RtlAllocateHeap() retval=00118238 ret=40658121 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00118190) ret=40649b87 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40649b87 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=4064e2fe 0014:Ret ntdll.RtlAllocateHeap() retval=00117ec0 ret=4064e2fe 0014:Call KERNEL32.QueueUserWorkItem(4064f780,00117ec0,00000010) ret=4064e33c 0015:Call rpcrt4.NdrServerInitializeNew(00118050,0063f3c8,401ce060) ret=401c7726 0015:Ret rpcrt4.NdrServerInitializeNew() retval=00000000 ret=401c7726 0015:Call rpcrt4.NdrServerContextNewUnmarshall(0063f3c8,401cdae8) ret=401c7807 0015:Call ntdll.RtlAcquireResourceExclusive(001181f4,00000001) ret=4063f2b9 0015:Ret ntdll.RtlAcquireResourceExclusive() retval=00000001 ret=4063f2b9 0015:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=406581a3 0015:Ret ntdll.RtlAllocateHeap() retval=00118150 ret=406581a3 0015:Ret rpcrt4.NdrServerContextNewUnmarshall() retval=001181d0 ret=401c7807 0015:Call rpcrt4.NdrSimpleStructUnmarshall(0063f3c8,0063f4ac,401cdaec,00000000) ret=401c7831 0015:Ret rpcrt4.NdrSimpleStructUnmarshall() retval=00000000 ret=401c7831 0015:Call KERNEL32.SetEvent(00000038) ret=401c1288 0014:Ret KERNEL32.QueueUserWorkItem() retval=00000001 ret=4064e33c 0014:Call ntdll.RtlAllocateHeap(00110000,00000008,0000002c) ret=4064e406 0014:Ret ntdll.RtlAllocateHeap() retval=00118190 ret=4064e406 0014:Call KERNEL32.ReadFile(00000024,0053f540,00000010,0053f4dc,00000000) ret=40651f1f 0015:Ret KERNEL32.SetEvent() retval=00000001 ret=401c1288 0015:Call rpcrt4.I_RpcGetBuffer(00118050) ret=401c7891 0015:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=40658121 0015:Ret ntdll.RtlAllocateHeap() retval=00117dc8 ret=40658121 0015:Ret rpcrt4.I_RpcGetBuffer() retval=00000000 ret=401c7891 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118150) ret=406576dc 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=406576dc 0015:Call ntdll.RtlReleaseResource(001181f4) ret=4063e5ab 0015:Ret ntdll.RtlReleaseResource() retval=00000000 ret=4063e5ab 0015:Call ntdll.RtlAllocateHeap(00110000,00000008,00000018) ret=40648f88 0015:Ret ntdll.RtlAllocateHeap() retval=00118270 ret=40648f88 0015:Call ntdll.RtlAllocateHeap(00110000,00000008,0000001c) ret=4064a461 0015:Ret ntdll.RtlAllocateHeap() retval=00118290 ret=4064a461 0015:Call KERNEL32.WriteFile(00000024,00118290,0000001c,0063f3ec,00000000) ret=40651c7f 0015:Ret KERNEL32.WriteFile() retval=00000001 ret=40651c7f 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118290) ret=4064a553 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064a553 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118270) ret=40648546 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40648546 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118238) ret=40658161 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117dc8) ret=40658161 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117cf8) ret=40648546 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40648546 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118050) ret=4064f836 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f836 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4064f859 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f859 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00117ec0) ret=4064f879 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f879 0017:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4070c629 0017:Ret ntdll.RtlAllocateHeap() retval=0011a278 ret=4070c629 0017:Call KERNEL32.ReadFile(00000020,0011a288,00000008,0053ed3c,00000000) ret=40714f1f 0017:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000004) ret=4070c6bc 0017:Ret ntdll.RtlAllocateHeap() retval=0011a5d0 ret=4070c6bc 0017:Call KERNEL32.ReadFile(00000020,0011a5d0,00000004,0053ed3c,00000000) ret=40714f1f 0017:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000004) ret=4071b121 0017:Ret ntdll.RtlAllocateHeap() retval=0011a5e8 ret=4071b121 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4070cb64 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070cb64 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011a5d0) ret=4070cb87 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070cb87 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011a278) ret=4070b546 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070b546 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011a530) ret=4071b161 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071b161 0017:Ret rpcrt4.NdrSendReceive() retval=00000000 ret=406475c2 0017:Call rpcrt4.NdrFreeBuffer(0053f0f4) ret=40645af4 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011a5e8) ret=4071b161 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071b161 0017:Ret rpcrt4.NdrFreeBuffer() retval=00000000 ret=40645af4 0017:Ret advapi32.SetServiceStatus() retval=00000001 ret=401c06fa 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007a) ret=401c073e 0017:Ret ntdll.RtlAllocateHeap() retval=0011a5d0 ret=401c073e 0017:Call KERNEL32.lstrcpyW(0011a5d0,401c12c0 L"\\Registry\\Machine\\System\\CurrentControlSet\\Services\\") ret=401c0755 0017:Ret KERNEL32.lstrcpyW() retval=0011a5d0 ret=401c0755 0017:Call KERNEL32.lstrcatW(0011a5d0 L"\\Registry\\Machine\\System\\CurrentControlSet\\Services\\",00114d02 L"MountMgr") ret=401c076a 0017:Ret KERNEL32.lstrcatW() retval=0011a5d0 ret=401c076a 0017:Call advapi32.RegOpenKeyW(80000002,0011a5f4 L"System\\CurrentControlSet\\Services\\MountMgr",401c24a8) ret=401c078a 0017:Ret advapi32.RegOpenKeyW() retval=00000000 ret=401c078a 0017:Call ntdll.RtlInitUnicodeString(0053f610,0011a5d0 L"\\Registry\\Machine\\System\\CurrentControlSet\\Services\\MountMgr") ret=401c08bf 0017:Ret ntdll.RtlInitUnicodeString() retval=00000078 ret=401c08bf 0017:Call advapi32.RegQueryValueExW(00000038,401c132a L"ImagePath",00000000,0053f61c,00000000,0053f618) ret=401c090b 0017:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c090b 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000052) ret=401c0937 0017:Ret ntdll.RtlAllocateHeap() retval=0011a658 ret=401c0937 0017:Call advapi32.RegQueryValueExW(00000038,401c132a L"ImagePath",00000000,0053f61c,0011a658,0053f618) ret=401c096e 0017:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401c096e 0017:Call KERNEL32.ExpandEnvironmentStringsW(0011a658 L"C:\\windows\\system32\\drivers\\mountmgr.sys",00000000,00000000) ret=401c0fd6 0017:Ret KERNEL32.ExpandEnvironmentStringsW() retval=00000029 ret=401c0fd6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000052) ret=401c0ffc 0017:Ret ntdll.RtlAllocateHeap() retval=0011a6b8 ret=401c0ffc 0017:Call KERNEL32.ExpandEnvironmentStringsW(0011a658 L"C:\\windows\\system32\\drivers\\mountmgr.sys",0011a6b8,00000029) ret=401c1014 0017:Ret KERNEL32.ExpandEnvironmentStringsW() retval=00000029 ret=401c1014 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011a658) ret=401c0998 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0998 0017:Call KERNEL32.LoadLibraryW(0011a6b8 L"C:\\windows\\system32\\drivers\\mountmgr.sys") ret=401c01bc 000f:Ret KERNEL32.ReadFile() retval=00000001 ret=401c3b3c 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117e80) ret=401c37bc 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c37bc 000f:Call KERNEL32.WaitForMultipleObjects(00000002,0033fbb0,00000000,00004e20) ret=401c3852 000f:Ret KERNEL32.WaitForMultipleObjects() retval=00000000 ret=401c3852 000f:Call KERNEL32.WaitForMultipleObjects(00000002,0033fbb0,00000000,00004e20) ret=401c3852 0017:Ret KERNEL32.LoadLibraryW() retval=401d0000 ret=401c01bc 0017:Call ntdll.RtlImageNtHeader(401d0000) ret=401c01d1 0017:Ret ntdll.RtlImageNtHeader() retval=401d0040 ret=401c01d1 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011a6b8) ret=401c0a27 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0a27 0017:Call ntdll.RtlImageNtHeader(401d0000) ret=401c0a3a 0017:Ret ntdll.RtlImageNtHeader() retval=401d0040 ret=401c0a3a 0017:Call driver init 0x401dad30 (obj=0x401c24c0,str=L"\\Registry\\Machine\\System\\CurrentControlSet\\Services\\MountMgr") 0017:Call ntdll.RtlInitUnicodeString(0053f30c,401db500 L"\\Device\\MountPointManager") ret=401d9aae 0017:Ret ntdll.RtlInitUnicodeString() retval=00000032 ret=401d9aae 0017:Call ntdll.RtlInitUnicodeString(0053f304,401db4c0 L"\\??\\MountPointManager") ret=401d9ac6 0017:Ret ntdll.RtlInitUnicodeString() retval=0000002a ret=401d9ac6 0017:Call ntoskrnl.exe.IoCreateDevice(401c24c0,00000000,0053f30c,00000000,00000000,00000000,0053f31c) ret=401d9aff 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,000000b8) ret=40690efe 0017:Ret ntdll.RtlAllocateHeap() retval=0011a658 ret=40690efe 0017:Ret ntoskrnl.exe.IoCreateDevice() retval=00000000 ret=401d9aff 0017:Call ntoskrnl.exe.IoCreateSymbolicLink(0053f304,0053f30c) ret=401d9b6f 0017:Call ntdll.NtCreateSymbolicLinkObject(0053f1ec,000f0001,0053f1d4,0053f30c) ret=40691303 0017:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0017:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401d9b6f 0017:Call advapi32.RegCreateKeyExW(80000002,401db540 L"System\\MountedDevices",00000000,00000000,00000001,000f003f,00000000,401dc6fc,00000000) ret=401d9bc8 0017:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401d9bc8 0017:Call advapi32.RegCreateKeyExW(80000002,401db440 L"HARDWARE\\DEVICEMAP",00000000,00000000,00000001,000f003f,00000000,0053f314,00000000) ret=401d9c18 0017:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401d9c18 0017:Call advapi32.RegCreateKeyExW(0000004c,401db416 L"PARALLEL PORTS",00000000,00000000,00000001,000f003f,00000000,0053f318,00000000) ret=401d9cff 0017:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401d9cff 0017:Call advapi32.RegCloseKey(00000050) ret=401d9d74 0017:Ret advapi32.RegCloseKey() retval=00000000 ret=401d9d74 0017:Call advapi32.RegCreateKeyExW(0000004c,401db400 L"SERIALCOMM",00000000,00000000,00000001,000f003f,00000000,0053f318,00000000) ret=401d9d4f 0017:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401d9d4f 0017:Call advapi32.RegCloseKey(00000050) ret=401d9d84 0017:Ret advapi32.RegCloseKey() retval=00000000 ret=401d9d84 0017:Call advapi32.RegCloseKey(0000004c) ret=401d9d61 0017:Ret advapi32.RegCloseKey() retval=00000000 ret=401d9d61 0017:Call ntdll.RtlInitUnicodeString(0053f30c,401db480 L"\\Driver\\Harddisk") ret=401d9c38 0017:Ret ntdll.RtlInitUnicodeString() retval=00000020 ret=401d9c38 0017:Call ntoskrnl.exe.IoCreateDriver(0053f30c,401d9090) ret=401d9c50 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,000000bc) ret=406904e8 0017:Ret ntdll.RtlAllocateHeap() retval=0011a718 ret=406904e8 0017:Call ntdll.RtlDuplicateUnicodeString(00000001,0053f30c,0011a734) ret=40690510 0017:Ret ntdll.RtlDuplicateUnicodeString() retval=00000000 ret=40690510 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000038) ret=401d7232 0017:Ret ntdll.RtlAllocateHeap() retval=0011a7e0 ret=401d7232 0017:Call ntoskrnl.exe.IoCreateDevice(0011a718,0000002c,0053f0b4,00000000,00000000,00000000,0053f0bc) ret=401d72d0 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,000000e4) ret=40690efe 0017:Ret ntdll.RtlAllocateHeap() retval=0011a920 ret=40690efe 0017:Ret ntoskrnl.exe.IoCreateDevice() retval=00000000 ret=401d72d0 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003c) ret=401d74a6 0017:Ret ntdll.RtlAllocateHeap() retval=0011a820 ret=401d74a6 0017:Call ntoskrnl.exe.IoCreateSymbolicLink(0053f0ac,0053f0b4) ret=401d74fb 0017:Call ntdll.NtCreateSymbolicLinkObject(0053ef8c,000f0001,0053ef74,0053f0b4) ret=40691303 0017:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0017:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401d74fb 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000023) ret=401d75d1 0017:Ret ntdll.RtlAllocateHeap() retval=0011aa10 ret=401d75d1 0017:Call advapi32.RegOpenKeyW(80000002,401db340 L"Software\\Wine\\Drives",0053f190) ret=401d9110 0017:Ret advapi32.RegOpenKeyW() retval=00000000 ret=401d9110 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011aa40 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011aa40) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011aa40 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011aa40) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011aa40 ret=401d76ae 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011aac8 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011aac8) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call advapi32.RegQueryValueExW(00000054,0053f182 L"c:",00000000,0053f18c,0053f142,0053f188) ret=401d925f 0017:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401d925f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401d846e 0017:Ret ntdll.RtlAllocateHeap() retval=0011aac8 ret=401d846e 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000028) ret=401d839f 0017:Ret ntdll.RtlAllocateHeap() retval=0011aae8 ret=401d839f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000044) ret=401d7232 0017:Ret ntdll.RtlAllocateHeap() retval=0011ab18 ret=401d7232 0017:Call ntoskrnl.exe.IoCreateDevice(0011a718,0000002c,0053f034,00000000,00000000,00000000,0053f03c) ret=401d72d0 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,000000e4) ret=40690efe 0017:Ret ntdll.RtlAllocateHeap() retval=0011ab68 ret=40690efe 0017:Ret ntoskrnl.exe.IoCreateDevice() retval=00000000 ret=401d72d0 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d7fc1 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fc1 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d7fe8 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fe8 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401d7d1b 0017:Ret ntdll.RtlAllocateHeap() retval=0011ac58 ret=401d7d1b 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,000000b6) ret=401da9d9 0017:Ret ntdll.RtlAllocateHeap() retval=0011ac70 ret=401da9d9 0017:Call ntdll.RtlInitUnicodeString(0011ac84,0011ac94 L"\\??\\Volume{00000000-0000-0000-0000-000000000043}") ret=401daa27 0017:Ret ntdll.RtlInitUnicodeString() retval=00000060 ret=401daa27 0017:Call ntoskrnl.exe.IoCreateSymbolicLink(0011ac84,0011ac28) ret=401daacc 0017:Call ntdll.NtCreateSymbolicLinkObject(0053ee0c,000f0001,0053edf4,0011ac28) ret=40691303 0017:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0017:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000072) ret=401da9d9 0017:Ret ntdll.RtlAllocateHeap() retval=0011ad30 ret=401da9d9 0017:Call ntdll.RtlInitUnicodeString(0011ad44,0011ad54 L"\\DosDevices\\C:") ret=401daa27 0017:Ret ntdll.RtlInitUnicodeString() retval=0000001c ret=401daa27 0017:Call ntoskrnl.exe.IoCreateSymbolicLink(0011ad44,0011ac28) ret=401daacc 0017:Call ntdll.NtCreateSymbolicLinkObject(0053eefc,000f0001,0053eee4,0011ac28) ret=40691303 0017:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0017:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,0000000b) ret=401d9ebb 0017:Ret ntdll.RtlAllocateHeap() retval=0011adb0 ret=401d9ebb 0017:Call advapi32.RegSetValueExW(00000048,0011ac94 L"\\??\\Volume{00000000-0000-0000-0000-000000000043}",00000000,00000003,0011adb0,0000000b) ret=401d9f0b 0017:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,0000000b) ret=401d9ebb 0017:Ret ntdll.RtlAllocateHeap() retval=0011adc8 ret=401d9ebb 0017:Call advapi32.RegSetValueExW(00000048,0011ad54 L"\\DosDevices\\C:",00000000,00000003,0011adc8,0000000b) ret=401d9f0b 0017:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011ade0 ret=401d76ae 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011ae68 ret=401d76ae 0017:Call advapi32.RegQueryValueExW(00000054,0053f182 L"d:",00000000,0053f18c,0053f142,0053f188) ret=401d925f 0017:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401d925f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401d846e 0017:Ret ntdll.RtlAllocateHeap() retval=0011aef0 ret=401d846e 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000028) ret=401d839f 0017:Ret ntdll.RtlAllocateHeap() retval=0011af10 ret=401d839f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000032) ret=401d7232 0017:Ret ntdll.RtlAllocateHeap() retval=0011af40 ret=401d7232 0017:Call ntoskrnl.exe.IoCreateDevice(0011a718,0000002c,0053f034,00000000,00000000,00000000,0053f03c) ret=401d72d0 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,000000e4) ret=40690efe 0017:Ret ntdll.RtlAllocateHeap() retval=0011af80 ret=40690efe 0017:Ret ntoskrnl.exe.IoCreateDevice() retval=00000000 ret=401d72d0 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d7fc1 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fc1 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d7fe8 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fe8 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401d7d1b 0017:Ret ntdll.RtlAllocateHeap() retval=0011b070 ret=401d7d1b 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401d7d1b 0017:Ret ntdll.RtlAllocateHeap() retval=0011b088 ret=401d7d1b 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,000000a4) ret=401da9d9 0017:Ret ntdll.RtlAllocateHeap() retval=0011b0a0 ret=401da9d9 0017:Call ntdll.RtlInitUnicodeString(0011b0b4,0011b0c4 L"\\??\\Volume{00000000-0000-0000-0000-000000000044}") ret=401daa27 0017:Ret ntdll.RtlInitUnicodeString() retval=00000060 ret=401daa27 0017:Call ntoskrnl.exe.IoCreateSymbolicLink(0011b0b4,0011b040) ret=401daacc 0017:Call ntdll.NtCreateSymbolicLinkObject(0053ee0c,000f0001,0053edf4,0011b040) ret=40691303 0017:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0017:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000060) ret=401da9d9 0017:Ret ntdll.RtlAllocateHeap() retval=0011b150 ret=401da9d9 0017:Call ntdll.RtlInitUnicodeString(0011b164,0011b174 L"\\DosDevices\\D:") ret=401daa27 0017:Ret ntdll.RtlInitUnicodeString() retval=0000001c ret=401daa27 0017:Call ntoskrnl.exe.IoCreateSymbolicLink(0011b164,0011b040) ret=401daacc 0017:Call ntdll.NtCreateSymbolicLinkObject(0053eefc,000f0001,0053eee4,0011b040) ret=40691303 0017:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0017:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,0000000e) ret=401d9ebb 0017:Ret ntdll.RtlAllocateHeap() retval=0011b1b8 ret=401d9ebb 0017:Call advapi32.RegSetValueExW(00000048,0011b0c4 L"\\??\\Volume{00000000-0000-0000-0000-000000000044}",00000000,00000003,0011b1b8,0000000e) ret=401d9f0b 0017:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,0000000e) ret=401d9ebb 0017:Ret ntdll.RtlAllocateHeap() retval=0011b1d0 ret=401d9ebb 0017:Call advapi32.RegSetValueExW(00000048,0011b174 L"\\DosDevices\\D:",00000000,00000003,0011b1d0,0000000e) ret=401d9f0b 0017:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b1e8 ret=401d76ae 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b270 ret=401d76ae 0017:Call advapi32.RegQueryValueExW(00000054,0053f182 L"e:",00000000,0053f18c,0053f142,0053f188) ret=401d925f 0017:Ret advapi32.RegQueryValueExW() retval=00000000 ret=401d925f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401d846e 0017:Ret ntdll.RtlAllocateHeap() retval=0011b2f8 ret=401d846e 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000028) ret=401d839f 0017:Ret ntdll.RtlAllocateHeap() retval=0011b318 ret=401d839f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000032) ret=401d7232 0017:Ret ntdll.RtlAllocateHeap() retval=0011b348 ret=401d7232 0017:Call ntoskrnl.exe.IoCreateDevice(0011a718,0000002c,0053f034,00000000,00000000,00000000,0053f03c) ret=401d72d0 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,000000e4) ret=40690efe 0017:Ret ntdll.RtlAllocateHeap() retval=0011b388 ret=40690efe 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b388) ret=4069101d 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4069101d 0017:Ret ntoskrnl.exe.IoCreateDevice() retval=c0000035 ret=401d72d0 0017:Call ntoskrnl.exe.IoCreateDevice(0011a718,0000002c,0053f034,00000000,00000000,00000000,0053f03c) ret=401d72d0 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,000000e4) ret=40690efe 0017:Ret ntdll.RtlAllocateHeap() retval=0011b388 ret=40690efe 0017:Ret ntoskrnl.exe.IoCreateDevice() retval=00000000 ret=401d72d0 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d7fc1 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fc1 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d7fe8 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fe8 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401d7d1b 0017:Ret ntdll.RtlAllocateHeap() retval=0011b478 ret=401d7d1b 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401d7d1b 0017:Ret ntdll.RtlAllocateHeap() retval=0011b490 ret=401d7d1b 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,000000a4) ret=401da9d9 0017:Ret ntdll.RtlAllocateHeap() retval=0011b4a8 ret=401da9d9 0017:Call ntdll.RtlInitUnicodeString(0011b4bc,0011b4cc L"\\??\\Volume{00000000-0000-0000-0000-000000000045}") ret=401daa27 0017:Ret ntdll.RtlInitUnicodeString() retval=00000060 ret=401daa27 0017:Call ntoskrnl.exe.IoCreateSymbolicLink(0011b4bc,0011b448) ret=401daacc 0017:Call ntdll.NtCreateSymbolicLinkObject(0053ee0c,000f0001,0053edf4,0011b448) ret=40691303 0017:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0017:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000060) ret=401da9d9 0017:Ret ntdll.RtlAllocateHeap() retval=0011b558 ret=401da9d9 0017:Call ntdll.RtlInitUnicodeString(0011b56c,0011b57c L"\\DosDevices\\E:") ret=401daa27 0017:Ret ntdll.RtlInitUnicodeString() retval=0000001c ret=401daa27 0017:Call ntoskrnl.exe.IoCreateSymbolicLink(0011b56c,0011b448) ret=401daacc 0017:Call ntdll.NtCreateSymbolicLinkObject(0053eefc,000f0001,0053eee4,0011b448) ret=40691303 0017:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0017:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000010) ret=401d9ebb 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5c0 ret=401d9ebb 0017:Call advapi32.RegSetValueExW(00000048,0011b4cc L"\\??\\Volume{00000000-0000-0000-0000-000000000045}",00000000,00000003,0011b5c0,00000010) ret=401d9f0b 0017:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000010) ret=401d9ebb 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5d8 ret=401d9ebb 0017:Call advapi32.RegSetValueExW(00000048,0011b57c L"\\DosDevices\\E:",00000000,00000003,0011b5d8,00000010) ret=401d9f0b 0017:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5f0) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b5f0 ret=401d76ae 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401d76ae 0017:Ret ntdll.RtlAllocateHeap() retval=0011b678 ret=401d76ae 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b678) ret=401d76e6 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d76e6 0017:Call advapi32.RegQueryValueExW(00000054,0053f182 L"z:",00000000,0053f18c,0053f142,0053f188) ret=401d925f 0017:Ret advapi32.RegQueryValueExW() retval=00000002 ret=401d925f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401d846e 0017:Ret ntdll.RtlAllocateHeap() retval=0011b678 ret=401d846e 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000028) ret=401d839f 0017:Ret ntdll.RtlAllocateHeap() retval=0011b698 ret=401d839f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000044) ret=401d7232 0017:Ret ntdll.RtlAllocateHeap() retval=0011b6c8 ret=401d7232 0017:Call ntoskrnl.exe.IoCreateDevice(0011a718,0000002c,0053f034,00000000,00000000,00000000,0053f03c) ret=401d72d0 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,000000e4) ret=40690efe 0017:Ret ntdll.RtlAllocateHeap() retval=0011b718 ret=40690efe 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b718) ret=4069101d 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4069101d 0017:Ret ntoskrnl.exe.IoCreateDevice() retval=c0000035 ret=401d72d0 0017:Call ntoskrnl.exe.IoCreateDevice(0011a718,0000002c,0053f034,00000000,00000000,00000000,0053f03c) ret=401d72d0 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,000000e4) ret=40690efe 0017:Ret ntdll.RtlAllocateHeap() retval=0011b718 ret=40690efe 0017:Ret ntoskrnl.exe.IoCreateDevice() retval=00000000 ret=401d72d0 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d7fc1 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fc1 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d7fe8 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fe8 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000002) ret=401d7d1b 0017:Ret ntdll.RtlAllocateHeap() retval=0011b808 ret=401d7d1b 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,000000b6) ret=401da9d9 0017:Ret ntdll.RtlAllocateHeap() retval=0011b820 ret=401da9d9 0017:Call ntdll.RtlInitUnicodeString(0011b834,0011b844 L"\\??\\Volume{00000000-0000-0000-0000-00000000005a}") ret=401daa27 0017:Ret ntdll.RtlInitUnicodeString() retval=00000060 ret=401daa27 0017:Call ntoskrnl.exe.IoCreateSymbolicLink(0011b834,0011b7d8) ret=401daacc 0017:Call ntdll.NtCreateSymbolicLinkObject(0053ee0c,000f0001,0053edf4,0011b7d8) ret=40691303 0017:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0017:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000072) ret=401da9d9 0017:Ret ntdll.RtlAllocateHeap() retval=0011b8e0 ret=401da9d9 0017:Call ntdll.RtlInitUnicodeString(0011b8f4,0011b904 L"\\DosDevices\\Z:") ret=401daa27 0017:Ret ntdll.RtlInitUnicodeString() retval=0000001c ret=401daa27 0017:Call ntoskrnl.exe.IoCreateSymbolicLink(0011b8f4,0011b7d8) ret=401daacc 0017:Call ntdll.NtCreateSymbolicLinkObject(0053eefc,000f0001,0053eee4,0011b7d8) ret=40691303 0017:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0017:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000004) ret=401d9ebb 0017:Ret ntdll.RtlAllocateHeap() retval=0011b960 ret=401d9ebb 0017:Call advapi32.RegSetValueExW(00000048,0011b844 L"\\??\\Volume{00000000-0000-0000-0000-00000000005a}",00000000,00000003,0011b960,00000004) ret=401d9f0b 0017:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000004) ret=401d9ebb 0017:Ret ntdll.RtlAllocateHeap() retval=0011b978 ret=401d9ebb 0017:Call advapi32.RegSetValueExW(00000048,0011b904 L"\\DosDevices\\Z:",00000000,00000003,0011b978,00000004) ret=401d9f0b 0017:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0017:Call advapi32.RegCloseKey(00000054) ret=401d9394 0017:Ret advapi32.RegCloseKey() retval=00000000 ret=401d9394 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011aa10) ret=401d93ba 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d93ba 0017:Ret ntoskrnl.exe.IoCreateDriver() retval=00000000 ret=401d9c50 0017:Call KERNEL32.CreateThread(00000000,00000000,401d9440,00000000,00000000,00000000) ret=401d9423 0017:Ret KERNEL32.CreateThread() retval=00000054 ret=401d9423 0017:Call KERNEL32.CloseHandle(00000054) ret=401d9432 0018:Call PE DLL (proc=0x4071d2f0,module=0x406d0000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) 0018:Ret PE DLL (proc=0x4071d2f0,module=0x406d0000 L"rpcrt4.dll",reason=THREAD_ATTACH,res=0x0) retval=1 0018:Starting thread proc 0x401d9440 (arg=0x0) 0017:Ret KERNEL32.CloseHandle() retval=00000001 ret=401d9432 0017:Ret driver init 0x401dad30 (obj=0x401c24c0,str=L"\\Registry\\Machine\\System\\CurrentControlSet\\Services\\MountMgr") retval=00000000 0017:Call advapi32.SetServiceStatus(00119058,0053f5f4) ret=401c0d94 0017:Call rpcrt4.NdrClientInitializeNew(0053f1d4,0053f0f4,406536c0,00000007) ret=40647540 0017:Ret rpcrt4.NdrClientInitializeNew() retval=4063fe20 ret=40647540 0017:Call rpcrt4.NDRCContextBinding(00119058) ret=40647553 0017:Ret rpcrt4.NDRCContextBinding() retval=0011a4e0 ret=40647553 0017:Call rpcrt4.NdrGetBuffer(0053f0f4,00000038,0011a4e0) ret=40647577 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000038) ret=4071b121 0017:Ret ntdll.RtlAllocateHeap() retval=0011b990 ret=4071b121 0017:Ret rpcrt4.NdrGetBuffer() retval=0011b990 ret=40647577 0017:Call rpcrt4.NdrClientContextMarshall(0053f0f4,00119058,00000000) ret=4064758e 0017:Ret rpcrt4.NdrClientContextMarshall() retval=00000000 ret=4064758e 0017:Call rpcrt4.NdrSimpleStructMarshall(0053f0f4,0053f5f4,40652b2c) ret=406475ad 0017:Ret rpcrt4.NdrSimpleStructMarshall() retval=00000000 ret=406475ad 0017:Call rpcrt4.NdrSendReceive(0053f0f4,0011b9c0) ret=406475c2 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000018) ret=4070d991 0017:Ret ntdll.RtlAllocateHeap() retval=0011aa10 ret=4070d991 0017:Call ntdll.RtlAllocateHeap(00110000,00000008,00000048) ret=4070d461 0017:Ret ntdll.RtlAllocateHeap() retval=0011b9d0 ret=4070d461 0017:Call KERNEL32.WriteFile(00000020,0011b9d0,00000048,0053edac,00000000) ret=40714c7f 0017:Ret KERNEL32.WriteFile() retval=00000001 ret=40714c7f 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b9d0) ret=4070d553 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070d553 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011aa10) ret=4070b546 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070b546 0017:Call KERNEL32.ReadFile(00000020,0053eda0,00000010,0053ed3c,00000000) ret=40714f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=40649629 0014:Ret ntdll.RtlAllocateHeap() retval=00117cf8 ret=40649629 0014:Call KERNEL32.ReadFile(00000024,00117d08,00000008,0053f4dc,00000000) ret=40651f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=406496bc 0014:Ret ntdll.RtlAllocateHeap() retval=00118050 ret=406496bc 0014:Call KERNEL32.ReadFile(00000024,00118050,00000030,0053f4dc,00000000) ret=40651f1f 0014:Ret KERNEL32.ReadFile() retval=00000001 ret=40651f1f 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=40658121 0014:Ret ntdll.RtlAllocateHeap() retval=00117e80 ret=40658121 0014:Call ntdll.RtlFreeHeap(00110000,00000000,00118050) ret=40649b87 0014:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40649b87 0014:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=4064e2fe 0014:Ret ntdll.RtlAllocateHeap() retval=00118050 ret=4064e2fe 0014:Call KERNEL32.QueueUserWorkItem(4064f780,00118050,00000010) ret=4064e33c 0016:Call ntdll.RtlAllocateHeap(00110000,00000008,00000030) ret=40657625 0016:Ret ntdll.RtlAllocateHeap() retval=00117eb8 ret=40657625 0016:Call KERNEL32.InitializeCriticalSection(00117ec0) ret=40657639 0016:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=40657639 0016:Call rpcrt4.NdrServerInitializeNew(00118190,0073f3c8,401ce060) ret=401c7726 0016:Ret rpcrt4.NdrServerInitializeNew() retval=00000000 ret=401c7726 0016:Call rpcrt4.NdrServerContextNewUnmarshall(0073f3c8,401cdae8) ret=401c7807 0016:Call ntdll.RtlAcquireResourceExclusive(001181f4,00000001) ret=4063f2b9 0016:Ret ntdll.RtlAcquireResourceExclusive() retval=00000001 ret=4063f2b9 0016:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=406581a3 0016:Ret ntdll.RtlAllocateHeap() retval=00117dc8 ret=406581a3 0016:Ret rpcrt4.NdrServerContextNewUnmarshall() retval=001181d0 ret=401c7807 0016:Call rpcrt4.NdrSimpleStructUnmarshall(0073f3c8,0073f4ac,401cdaec,00000000) ret=401c7831 0016:Ret rpcrt4.NdrSimpleStructUnmarshall() retval=00000000 ret=401c7831 0016:Call KERNEL32.SetEvent(00000038) ret=401c1288 0014:Ret KERNEL32.QueueUserWorkItem() retval=00000001 ret=4064e33c 0014:Call ntdll.RtlAllocateHeap(00110000,00000008,0000002c) ret=4064e406 0014:Ret ntdll.RtlAllocateHeap() retval=00118260 ret=4064e406 0014:Call KERNEL32.ReadFile(00000024,0053f540,00000010,0053f4dc,00000000) ret=40651f1f 0016:Ret KERNEL32.SetEvent() retval=00000001 ret=401c1288 0016:Call rpcrt4.I_RpcGetBuffer(00118190) ret=401c7891 0016:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=40658121 0016:Ret ntdll.RtlAllocateHeap() retval=00118150 ret=40658121 0016:Ret rpcrt4.I_RpcGetBuffer() retval=00000000 ret=401c7891 0016:Call ntdll.RtlFreeHeap(00110000,00000000,00117dc8) ret=406576dc 0016:Ret ntdll.RtlFreeHeap() retval=00000001 ret=406576dc 0016:Call ntdll.RtlReleaseResource(001181f4) ret=4063e5ab 0016:Ret ntdll.RtlReleaseResource() retval=00000000 ret=4063e5ab 0016:Call ntdll.RtlAllocateHeap(00110000,00000008,00000018) ret=40648f88 0016:Ret ntdll.RtlAllocateHeap() retval=00118298 ret=40648f88 0016:Call ntdll.RtlAllocateHeap(00110000,00000008,0000001c) ret=4064a461 0016:Ret ntdll.RtlAllocateHeap() retval=001182b8 ret=4064a461 0016:Call KERNEL32.WriteFile(00000024,001182b8,0000001c,0073f3ec,00000000) ret=40651c7f 0016:Ret KERNEL32.WriteFile() retval=00000001 ret=40651c7f 0016:Call ntdll.RtlFreeHeap(00110000,00000000,001182b8) ret=4064a553 0016:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064a553 0016:Call ntdll.RtlFreeHeap(00110000,00000000,00118298) ret=40648546 0016:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40648546 0016:Call ntdll.RtlFreeHeap(00110000,00000000,00117e80) ret=40658161 0016:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 0016:Call ntdll.RtlFreeHeap(00110000,00000000,00118150) ret=40658161 0016:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40658161 0016:Call ntdll.RtlFreeHeap(00110000,00000000,00117cf8) ret=40648546 0016:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40648546 0016:Call ntdll.RtlFreeHeap(00110000,00000000,00118190) ret=4064f836 0016:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f836 0016:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4064f859 0016:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f859 0016:Call ntdll.RtlFreeHeap(00110000,00000000,00118050) ret=4064f879 0016:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064f879 0017:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4070c629 0017:Ret ntdll.RtlAllocateHeap() retval=0011aa10 ret=4070c629 0017:Call KERNEL32.ReadFile(00000020,0011aa20,00000008,0053ed3c,00000000) ret=40714f1f 0017:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000004) ret=4070c6bc 0017:Ret ntdll.RtlAllocateHeap() retval=0011b9d0 ret=4070c6bc 0017:Call KERNEL32.ReadFile(00000020,0011b9d0,00000004,0053ed3c,00000000) ret=40714f1f 0017:Ret KERNEL32.ReadFile() retval=00000001 ret=40714f1f 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00000004) ret=4071b121 0017:Ret ntdll.RtlAllocateHeap() retval=0011b9e8 ret=4071b121 0017:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=4070cb64 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070cb64 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b9d0) ret=4070cb87 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070cb87 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011aa10) ret=4070b546 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4070b546 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b990) ret=4071b161 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071b161 0017:Ret rpcrt4.NdrSendReceive() retval=00000000 ret=406475c2 0017:Call rpcrt4.NdrFreeBuffer(0053f0f4) ret=40645af4 0017:Call ntdll.RtlFreeHeap(00110000,00000000,0011b9e8) ret=4071b161 0017:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4071b161 0017:Ret rpcrt4.NdrFreeBuffer() retval=00000000 ret=40645af4 0017:Ret advapi32.SetServiceStatus() retval=00000001 ret=401c0d94 0017:Call ntoskrnl.exe.wine_ntoskrnl_main_loop(00000034) ret=401c0da5 0017:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=4069064b 0017:Ret ntdll.RtlAllocateHeap() retval=0011b990 ret=4069064b 0017:Call KERNEL32.WaitForMultipleObjects(00000002,0053f2a8,00000000,ffffffff) ret=40690a36 000f:Ret KERNEL32.WaitForMultipleObjects() retval=00000000 ret=401c3852 000f:Call KERNEL32.CloseHandle(00000048) ret=401c3466 000f:Ret KERNEL32.CloseHandle() retval=00000001 ret=401c3466 000f:Call KERNEL32.ReleaseMutex(00000034) ret=401c3474 000f:Ret KERNEL32.ReleaseMutex() retval=00000001 ret=401c3474 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117c70) ret=401c4791 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c4791 000f:Call ntdll.__wine_make_process_system() ret=401c0e04 000f:Ret ntdll.__wine_make_process_system() retval=00000048 ret=401c0e04 000f:Call KERNEL32.SetEvent(00000014) ret=401c0e16 000b:Ret KERNEL32.WaitForMultipleObjects() retval=00000000 ret=401c46a7 000b:Call KERNEL32.CloseHandle(00000024) ret=401c46bf 000b:Ret KERNEL32.CloseHandle() retval=00000001 ret=401c46bf 000b:Call KERNEL32.CloseHandle(0000001c) ret=401c46d0 000b:Ret KERNEL32.CloseHandle() retval=00000001 ret=401c46d0 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002d) ret=401c28d8 000b:Ret ntdll.RtlAllocateHeap() retval=00116148 ret=401c28d8 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=401c2992 000b:Ret ntdll.RtlAllocateHeap() retval=00116180 ret=401c2992 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00116180) ret=401c2aa7 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2aa7 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00116148) ret=401c2cc5 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c2cc5 000b:Call advapi32.RegCreateKeyExW(80000001,401c61c0 L"Volatile Environment",00000000,00000000,00000001,000f003f,00000000,0033ef28,00000000) ret=401c145f 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=401c145f 000b:Call KERNEL32.LoadLibraryA(401ca998 "shell32.dll") ret=401c4ccb 000f:Ret KERNEL32.SetEvent() retval=00000001 ret=401c0e16 000f:Call KERNEL32.WaitForSingleObjectEx(00000048,ffffffff,00000001) ret=401c0e6c 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,00000023) ret=401d75d1 0018:Ret ntdll.RtlAllocateHeap() retval=0011aa10 ret=401d75d1 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,00000023) ret=401d75d1 0018:Ret ntdll.RtlAllocateHeap() retval=0011c998 ret=401d75d1 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011c998) ret=401d8caf 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d8caf 0018:Call advapi32.RegDeleteValueW(00000048,0011b57c L"\\DosDevices\\E:") ret=401d9fbd 0018:Ret advapi32.RegDeleteValueW() retval=00000000 ret=401d9fbd 0018:Call ntoskrnl.exe.IoDeleteSymbolicLink(0011b56c) ret=401d9fcb 0018:Call ntdll.NtOpenSymbolicLinkObject(0063e31c,00000000,0063e304) ret=40690c61 0018:Ret ntdll.NtOpenSymbolicLinkObject() retval=00000000 ret=40690c61 0018:Call ntdll.NtClose(00000054) ret=40690ca9 0018:Ret ntdll.NtClose() retval=00000000 ret=40690ca9 0018:Ret ntoskrnl.exe.IoDeleteSymbolicLink() retval=00000000 ret=401d9fcb 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5d8) ret=401d9fef 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9fef 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b558) ret=401da00f 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401da00f 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b2f8) ret=401d7a1a 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7a1a 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401d846e 0018:Ret ntdll.RtlAllocateHeap() retval=0011b2f8 ret=401d846e 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401d7d1b 0018:Ret ntdll.RtlAllocateHeap() retval=0011b5d8 ret=401d7d1b 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b478) ret=401d7fc1 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fc1 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b490) ret=401d7fe8 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fe8 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401d7d1b 0018:Ret ntdll.RtlAllocateHeap() retval=0011b478 ret=401d7d1b 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401d7d1b 0018:Ret ntdll.RtlAllocateHeap() retval=0011b558 ret=401d7d1b 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,00000060) ret=401da9d9 0018:Ret ntdll.RtlAllocateHeap() retval=0011c998 ret=401da9d9 0018:Call ntdll.RtlInitUnicodeString(0011c9ac,0011c9bc L"\\DosDevices\\E:") ret=401daa27 0018:Ret ntdll.RtlInitUnicodeString() retval=0000001c ret=401daa27 0018:Call ntoskrnl.exe.IoCreateSymbolicLink(0011c9ac,0011b448) ret=401daacc 0018:Call ntdll.NtCreateSymbolicLinkObject(0063e25c,000f0001,0063e244,0011b448) ret=40691303 0018:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0018:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b5c0) ret=401d9e8c 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0018:Call ntdll.RtlAllocateHeap(00110000,00000008,00000010) ret=401d9ebb 0018:Ret ntdll.RtlAllocateHeap() retval=0011b570 ret=401d9ebb 0018:Call advapi32.RegSetValueExW(00000048,0011b4cc L"\\??\\Volume{00000000-0000-0000-0000-000000000045}",00000000,00000003,0011b570,00000010) ret=401d9f0b 0018:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0018:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0018:Call ntdll.RtlAllocateHeap(00110000,00000008,00000010) ret=401d9ebb 0018:Ret ntdll.RtlAllocateHeap() retval=0011b588 ret=401d9ebb 0018:Call advapi32.RegSetValueExW(00000048,0011c9bc L"\\DosDevices\\E:",00000000,00000003,0011b588,00000010) ret=401d9f0b 0018:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0018:Call advapi32.RegCreateKeyW(80000002,401db340 L"Software\\Wine\\Drives",0063e578) ret=401d89d0 0018:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401d89d0 0018:Call advapi32.RegSetValueExW(00000088,0063e510 L"e:",00000000,00000001,401db3c0,0000000c) ret=401d8ace 0018:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d8ace 0018:Call advapi32.RegCloseKey(00000088) ret=401d8a3d 0018:Ret advapi32.RegCloseKey() retval=00000000 ret=401d8a3d 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011aa10) ret=401d8879 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d8879 0018:Call KERNEL32.LoadLibraryA(401dc66c "user32.dll") ret=401daceb 000b:Call PE DLL (proc=0x42a17de0,module=0x429c0000 L"gdi32.dll",reason=PROCESS_ATTACH,res=0x0) 0018:Call PE DLL (proc=0x407b9de0,module=0x40760000 L"gdi32.dll",reason=PROCESS_ATTACH,res=0x0) 000d:Ret PE DLL (proc=0x42a17de0,module=0x429c0000 L"gdi32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x4290f0c0,module=0x42870000 L"user32.dll",reason=PROCESS_ATTACH,res=0x1) 000d:Call PE DLL (proc=0x434efbb0,module=0x434e0000 L"imm32.dll",reason=PROCESS_ATTACH,res=0x0) 000d:Call user32.RegisterWindowMessageA(434f0250 "MSIMEService") ret=434eaa8e 000d:Ret user32.RegisterWindowMessageA() retval=0000c000 ret=434eaa8e 000d:Call user32.RegisterWindowMessageA(434f025d "MSIMEReconvertOptions") ret=434eaaa5 000d:Ret user32.RegisterWindowMessageA() retval=0000c001 ret=434eaaa5 000d:Call user32.RegisterWindowMessageA(434f0273 "MSIMEMouseOperation") ret=434eaabc 000d:Ret user32.RegisterWindowMessageA() retval=0000c002 ret=434eaabc 000d:Call user32.RegisterWindowMessageA(434f0287 "MSIMEReconvertRequest") ret=434eaad3 000d:Ret user32.RegisterWindowMessageA() retval=0000c003 ret=434eaad3 000d:Call user32.RegisterWindowMessageA(434f029d "MSIMEReconvert") ret=434eaaea 000d:Ret user32.RegisterWindowMessageA() retval=0000c004 ret=434eaaea 000d:Call user32.RegisterWindowMessageA(434f02ac "MSIMEQueryPosition") ret=434eab01 000d:Ret user32.RegisterWindowMessageA() retval=0000c005 ret=434eab01 000d:Call user32.RegisterWindowMessageA(434f02bf "MSIMEDocumentFeed") ret=434eab18 000d:Ret user32.RegisterWindowMessageA() retval=0000c006 ret=434eab18 000d:Call KERNEL32.TlsAlloc() ret=434eab26 000d:Ret KERNEL32.TlsAlloc() retval=00000000 ret=434eab26 000d:Ret PE DLL (proc=0x434efbb0,module=0x434e0000 L"imm32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000d:Call PE DLL (proc=0x4332b1e0,module=0x432c0000 L"winex11.drv",reason=PROCESS_ATTACH,res=0x0) 000d:Ret PE DLL (proc=0x4332b1e0,module=0x432c0000 L"winex11.drv",reason=PROCESS_ATTACH,res=0x0) retval=1 000d:Ret PE DLL (proc=0x4290f0c0,module=0x42870000 L"user32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x405c6b50,module=0x40590000 L"shlwapi.dll",reason=PROCESS_ATTACH,res=0x1) 000d:Call KERNEL32.DisableThreadLibraryCalls(40590000) ret=405b884b 000d:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=405b884b 000d:Call KERNEL32.TlsAlloc() ret=405b8859 000d:Ret KERNEL32.TlsAlloc() retval=00000002 ret=405b8859 000d:Ret PE DLL (proc=0x405c6b50,module=0x40590000 L"shlwapi.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x42af8af0,module=0x42a60000 L"comctl32.dll",reason=PROCESS_ATTACH,res=0x1) 000d:Call KERNEL32.DisableThreadLibraryCalls(42a60000) ret=42a705db 000d:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=42a705db 000d:Call KERNEL32.GlobalAddAtomW(42b064c0 L"CC32SubclassInfo") ret=42a705f2 000d:Ret KERNEL32.GlobalAddAtomW() retval=0000c015 ret=42a705f2 000d:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42b064e2) ret=42a70639 000d:Ret gdi32.CreateBitmap() retval=00000204 ret=42a70639 000d:Call gdi32.CreatePatternBrush(00000204) ret=42a7064a 000d:Ret gdi32.CreatePatternBrush() retval=0000020c ret=42a7064a 000d:Call user32.GetSysColor(00000014) ret=42a6e53a 000d:Ret user32.GetSysColor() retval=00ffffff ret=42a6e53a 000d:Call user32.GetSysColor(00000010) ret=42a6e551 000d:Ret user32.GetSysColor() retval=00808080 ret=42a6e551 000d:Call user32.GetSysColor(00000012) ret=42a6e563 000d:Ret user32.GetSysColor() retval=00000000 ret=42a6e563 000d:Call user32.GetSysColor(0000000f) ret=42a6e575 000d:Ret user32.GetSysColor() retval=00c8d0d4 ret=42a6e575 000d:Call user32.GetSysColor(0000000d) ret=42a6e587 000d:Ret user32.GetSysColor() retval=006a240a ret=42a6e587 000d:Call user32.GetSysColor(0000000e) ret=42a6e599 000d:Ret user32.GetSysColor() retval=00ffffff ret=42a6e599 000d:Call user32.GetSysColor(0000001a) ret=42a6e5ab 000d:Ret user32.GetSysColor() retval=00800000 ret=42a6e5ab 000d:Call user32.GetSysColor(00000014) ret=42a6e5bd 000d:Ret user32.GetSysColor() retval=00ffffff ret=42a6e5bd 000d:Call user32.GetSysColor(00000010) ret=42a6e5cf 000d:Ret user32.GetSysColor() retval=00808080 ret=42a6e5cf 000d:Call user32.GetSysColor(00000015) ret=42a6e5e1 000d:Ret user32.GetSysColor() retval=00404040 ret=42a6e5e1 000d:Call user32.GetSysColor(0000000f) ret=42a6e5f3 000d:Ret user32.GetSysColor() retval=00c8d0d4 ret=42a6e5f3 000d:Call user32.GetSysColor(00000005) ret=42a6e605 000d:Ret user32.GetSysColor() retval=00ffffff ret=42a6e605 000d:Call user32.GetSysColor(00000008) ret=42a6e617 000d:Ret user32.GetSysColor() retval=00000000 ret=42a6e617 000d:Call user32.GetSysColor(00000011) ret=42a6e629 000d:Ret user32.GetSysColor() retval=00808080 ret=42a6e629 000d:Call user32.GetSysColor(00000002) ret=42a6e63b 000d:Ret user32.GetSysColor() retval=006a240a ret=42a6e63b 000d:Call user32.GetSysColor(00000018) ret=42a6e64d 000d:Ret user32.GetSysColor() retval=00e1ffff ret=42a6e64d 000d:Call user32.GetSysColor(00000017) ret=42a6e65f 000d:Ret user32.GetSysColor() retval=00000000 ret=42a6e65f 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42a63126 000d:Ret user32.LoadCursorW() retval=00010020 ret=42a63126 000d:Call user32.RegisterClassW(0033fc4c) ret=42a6318f 000d:Ret user32.RegisterClassW() retval=0000c016 ret=42a6318f 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42a65d46 000d:Ret user32.LoadCursorW() retval=00010020 ret=42a65d46 000d:Call user32.RegisterClassW(0033fc4c) ret=42a65daf 000d:Ret user32.RegisterClassW() retval=0000c017 ret=42a65daf 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42a70d36 000d:Ret user32.LoadCursorW() retval=00010020 ret=42a70d36 000d:Call user32.RegisterClassW(0033fc44) ret=42a70dbd 000d:Ret user32.RegisterClassW() retval=0000c018 ret=42a70dbd 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42a78096 000d:Ret user32.LoadCursorW() retval=00010020 ret=42a78096 000d:Call user32.RegisterClassW(0033fc48) ret=42a7810b 000d:Ret user32.RegisterClassW() retval=0000c019 ret=42a7810b 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42a78876 000d:Ret user32.LoadCursorW() retval=00010020 ret=42a78876 000d:Call user32.RegisterClassW(0033fc50) ret=42a788d2 000d:Ret user32.RegisterClassW() retval=0000c01a ret=42a788d2 000d:Call user32.RegisterClassW(0033fc58) ret=42a7d287 000d:Ret user32.RegisterClassW() retval=0000c01b ret=42a7d287 000d:Call user32.LoadCursorW(00000000,00007f01) ret=42a86d66 000d:Ret user32.LoadCursorW() retval=00010022 ret=42a86d66 000d:Call user32.RegisterClassW(0033fc48) ret=42a86ddb 000d:Ret user32.RegisterClassW() retval=0000c01c ret=42a86ddb 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42a88946 000d:Ret user32.LoadCursorW() retval=00010020 ret=42a88946 000d:Call user32.RegisterClassW(0033fc4c) ret=42a889b5 000d:Ret user32.RegisterClassW() retval=0000c01d ret=42a889b5 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42aa3e36 000d:Ret user32.LoadCursorW() retval=00010020 ret=42aa3e36 000d:Call user32.RegisterClassW(0033fc4c) ret=42aa3ea5 000d:Ret user32.RegisterClassW() retval=0000c01e ret=42aa3ea5 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42aaa6a6 000d:Ret user32.LoadCursorW() retval=00010020 ret=42aaa6a6 000d:Call user32.RegisterClassW(0033fc4c) ret=42aaa715 000d:Ret user32.RegisterClassW() retval=0000c01f ret=42aaa715 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42aaaa26 000d:Ret user32.LoadCursorW() retval=00010020 ret=42aaaa26 000d:Call user32.RegisterClassW(0033fc54) ret=42aaaa77 000d:Ret user32.RegisterClassW() retval=0000c020 ret=42aaaa77 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42aadad6 000d:Ret user32.LoadCursorW() retval=00010020 ret=42aadad6 000d:Call user32.RegisterClassW(0033fc44) ret=42aadb56 000d:Ret user32.RegisterClassW() retval=0000c021 ret=42aadb56 000d:Call user32.RegisterClassW(0033fc5c) ret=42ab702b 000d:Ret user32.RegisterClassW() retval=0000c022 ret=42ab702b 000d:Call user32.GetSystemMetrics(00000044) ret=42ab703a 000d:Ret user32.GetSystemMetrics() retval=00000004 ret=42ab703a 000d:Call user32.GetSystemMetrics(00000045) ret=42ab704f 000d:Ret user32.GetSystemMetrics() retval=00000004 ret=42ab704f 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42ac02f0 000d:Ret user32.LoadCursorW() retval=00010020 ret=42ac02f0 000d:Call user32.RegisterClassW(0033fc40) ret=42ac037d 000d:Ret user32.RegisterClassW() retval=0000c023 ret=42ac037d 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42ac5796 000d:Ret user32.LoadCursorW() retval=00010020 ret=42ac5796 000d:Call user32.RegisterClassW(0033fc58) ret=42ac57da 000d:Ret user32.RegisterClassW() retval=0000c024 ret=42ac57da 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42ac8336 000d:Ret user32.LoadCursorW() retval=00010020 ret=42ac8336 000d:Call user32.RegisterClassW(0033fc48) ret=42ac83b1 000d:Ret user32.RegisterClassW() retval=0000c025 ret=42ac83b1 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42ad24e6 000d:Ret user32.LoadCursorW() retval=00010020 ret=42ad24e6 000d:Call user32.RegisterClassW(0033fc48) ret=42ad2561 000d:Ret user32.RegisterClassW() retval=0000c026 ret=42ad2561 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42ae1a50 000d:Ret user32.LoadCursorW() retval=00010020 ret=42ae1a50 000d:Call user32.RegisterClassW(0033fc44) ret=42ae1ad1 000d:Ret user32.RegisterClassW() retval=0000c027 ret=42ae1ad1 000d:Call user32.LoadImageW(42a60000,00000016,00000001,00000000,00000000,00000000) ret=42ae1b1c 000d:Ret user32.LoadImageW() retval=00010024 ret=42ae1b1c 000d:Call user32.LoadImageW(42a60000,00000019,00000001,00000000,00000000,00000000) ret=42ae1b54 000d:Ret user32.LoadImageW() retval=00010026 ret=42ae1b54 000d:Call user32.LoadImageW(42a60000,0000001c,00000001,00000000,00000000,00000000) ret=42ae1b8c 000d:Ret user32.LoadImageW() retval=00010028 ret=42ae1b8c 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42ae6b46 000d:Ret user32.LoadCursorW() retval=00010020 ret=42ae6b46 000d:Call user32.RegisterClassW(0033fc44) ret=42ae6bcd 000d:Ret user32.RegisterClassW() retval=0000c028 ret=42ae6bcd 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42aeaea3 000d:Ret user32.LoadCursorW() retval=00010020 ret=42aeaea3 000d:Call user32.RegisterClassW(0033fc4c) ret=42aeaf12 000d:Ret user32.RegisterClassW() retval=0000c029 ret=42aeaf12 000d:Call user32.LoadCursorW(00000000,00007f00) ret=42af6486 000d:Ret user32.LoadCursorW() retval=00010020 ret=42af6486 000d:Call user32.RegisterClassW(0033fc48) ret=42af6501 000d:Ret user32.RegisterClassW() retval=0000c02a ret=42af6501 000d:Call KERNEL32.LoadLibraryA(42b0e156 "uxtheme.dll") ret=42af8aab 000d:Call PE DLL (proc=0x43543540,module=0x43530000 L"uxtheme.dll",reason=PROCESS_ATTACH,res=0x0) 000d:Call KERNEL32.DisableThreadLibraryCalls(43530000) ret=4353b9de 000d:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=4353b9de 000d:Call KERNEL32.GlobalAddAtomW(43551f8a L"ux_theme") ret=435416c8 000d:Ret KERNEL32.GlobalAddAtomW() retval=0000c02b ret=435416c8 000d:Call KERNEL32.GlobalAddAtomW(43551f76 L"ux_subapp") ret=435416e0 000d:Ret KERNEL32.GlobalAddAtomW() retval=0000c02c ret=435416e0 000d:Call KERNEL32.GlobalAddAtomW(43551f5e L"ux_subidlst") ret=435416f8 000d:Ret KERNEL32.GlobalAddAtomW() retval=0000c02d ret=435416f8 000d:Call KERNEL32.GlobalAddAtomW(43551f40 L"ux_dialogtheme") ret=43541710 000d:Ret KERNEL32.GlobalAddAtomW() retval=0000c02e ret=43541710 000d:Call advapi32.RegOpenKeyW(80000001,43551dc0 L"Software\\Microsoft\\Windows\\CurrentVersion\\ThemeManager",0033f548) ret=43541739 000d:Ret advapi32.RegOpenKeyW() retval=00000002 ret=43541739 000d:Ret PE DLL (proc=0x43543540,module=0x43530000 L"uxtheme.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000d:Ret KERNEL32.LoadLibraryA() retval=43530000 ret=42af8aab 000d:Call KERNEL32.GetProcAddress(43530000,42b0e282 "IsThemeActive") ret=42af8a7c 000d:Ret KERNEL32.GetProcAddress() retval=43533aa8 ret=42af8a7c 000d:Call uxtheme.IsThemeActive() ret=42ad2087 000d:Ret uxtheme.IsThemeActive() retval=00000000 ret=42ad2087 000d:Ret PE DLL (proc=0x42af8af0,module=0x42a60000 L"comctl32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x426d9ab0,module=0x42660000 L"shell32.dll",reason=PROCESS_ATTACH,res=0x1) 000d:Call KERNEL32.DisableThreadLibraryCalls(42660000) ret=426900d1 000d:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=426900d1 000d:Call KERNEL32.GetModuleFileNameW(42660000,4282d1e0,00000104) ret=426900ee 000d:Ret KERNEL32.GetModuleFileNameW() retval=0000001f ret=426900ee 000d:Call comctl32.InitCommonControlsEx(00000000) ret=42690106 000d:Ret comctl32.InitCommonControlsEx() retval=00000000 ret=42690106 000d:Call user32.GetSystemMetrics(00000031) ret=42686451 000d:Ret user32.GetSystemMetrics() retval=00000010 ret=42686451 000d:Call user32.GetSystemMetrics(00000032) ret=42686462 000d:Ret user32.GetSystemMetrics() retval=00000010 ret=42686462 000d:Call user32.GetSystemMetrics(0000000b) ret=42686473 000d:Ret user32.GetSystemMetrics() retval=00000020 ret=42686473 000d:Call user32.GetSystemMetrics(0000000c) ret=42686485 000d:Ret user32.GetSystemMetrics() retval=00000020 ret=42686485 000d:Call comctl32.328(00000010) ret=4268650c 000d:Call KERNEL32.LocalAlloc(00000040,00000014) ret=42a6c623 000d:Ret KERNEL32.LocalAlloc() retval=0013ea88 ret=42a6c623 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,00000080) ret=42a75848 000d:Ret ntdll.RtlAllocateHeap() retval=0013ec18 ret=42a75848 000d:Ret comctl32.328() retval=0013ea88 ret=4268650c 000d:Call comctl32.ImageList_Create(00000010,00000010,00000021,00000000,00000020) ret=42686541 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008c) ret=42a8463a 000d:Ret ntdll.RtlAllocateHeap() retval=0013eca0 ret=42a8463a 000d:Call gdi32.CreateCompatibleDC(00000000) ret=42a847a0 000d:Ret gdi32.CreateCompatibleDC() retval=00000298 ret=42a847a0 000d:Call gdi32.CreateCompatibleDC(00000000) ret=42a84974 000d:Ret gdi32.CreateCompatibleDC() retval=000002a4 ret=42a84974 000d:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42a6c623 000d:Ret KERNEL32.LocalAlloc() retval=0013f288 ret=42a6c623 000d:Call gdi32.CreateDIBSection(00000298,0013f288,00000000,0033fb7c,00000000,00000000) ret=42a7f5b7 000d:Ret gdi32.CreateDIBSection() retval=000002b0 ret=42a7f5b7 000d:Call KERNEL32.LocalFree(0013f288) ret=42a6c36b 000d:Ret KERNEL32.LocalFree() retval=00000000 ret=42a6c36b 000d:Call gdi32.SelectObject(00000298,000002b0) ret=42a8480f 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a8480f 000d:Call gdi32.CreateBitmap(00000040,00000010,00000001,00000001,00000000) ret=42a84a0c 000d:Ret gdi32.CreateBitmap() retval=000002b4 ret=42a84a0c 000d:Call gdi32.SelectObject(000002a4,000002b4) ret=42a84a2b 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a84a2b 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,00000001) ret=42a84a5b 000d:Ret ntdll.RtlAllocateHeap() retval=0013f288 ret=42a84a5b 000d:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42b065da) ret=42a84871 000d:Ret gdi32.CreateBitmap() retval=000002b8 ret=42a84871 000d:Call gdi32.CreatePatternBrush(000002b8) ret=42a84881 000d:Ret gdi32.CreatePatternBrush() retval=000002c0 ret=42a84881 000d:Call gdi32.DeleteObject(000002b8) ret=42a8488f 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a8488f 000d:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42b065ca) ret=42a848c0 000d:Ret gdi32.CreateBitmap() retval=000002c4 ret=42a848c0 000d:Call gdi32.CreatePatternBrush(000002c4) ret=42a848d0 000d:Ret gdi32.CreatePatternBrush() retval=000002cc ret=42a848d0 000d:Call gdi32.DeleteObject(000002c4) ret=42a848de 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a848de 000d:Ret comctl32.ImageList_Create() retval=0013eca0 ret=42686541 000d:Call comctl32.ImageList_Create(00000020,00000020,00000021,00000000,00000020) ret=42686576 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008c) ret=42a8463a 000d:Ret ntdll.RtlAllocateHeap() retval=00140700 ret=42a8463a 000d:Call gdi32.CreateCompatibleDC(00000000) ret=42a847a0 000d:Ret gdi32.CreateCompatibleDC() retval=000002d0 ret=42a847a0 000d:Call gdi32.CreateCompatibleDC(00000000) ret=42a84974 000d:Ret gdi32.CreateCompatibleDC() retval=000002dc ret=42a84974 000d:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42a6c623 000d:Ret KERNEL32.LocalAlloc() retval=00140ce8 ret=42a6c623 000d:Call gdi32.CreateDIBSection(000002d0,00140ce8,00000000,0033fb7c,00000000,00000000) ret=42a7f5b7 000d:Ret gdi32.CreateDIBSection() retval=000002e8 ret=42a7f5b7 000d:Call KERNEL32.LocalFree(00140ce8) ret=42a6c36b 000d:Ret KERNEL32.LocalFree() retval=00000000 ret=42a6c36b 000d:Call gdi32.SelectObject(000002d0,000002e8) ret=42a8480f 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a8480f 000d:Call gdi32.CreateBitmap(00000080,00000020,00000001,00000001,00000000) ret=42a84a0c 000d:Ret gdi32.CreateBitmap() retval=000002ec ret=42a84a0c 000d:Call gdi32.SelectObject(000002dc,000002ec) ret=42a84a2b 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a84a2b 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,00000001) ret=42a84a5b 000d:Ret ntdll.RtlAllocateHeap() retval=00140ce8 ret=42a84a5b 000d:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42b065da) ret=42a84871 000d:Ret gdi32.CreateBitmap() retval=000002f0 ret=42a84871 000d:Call gdi32.CreatePatternBrush(000002f0) ret=42a84881 000d:Ret gdi32.CreatePatternBrush() retval=000002f8 ret=42a84881 000d:Call gdi32.DeleteObject(000002f0) ret=42a8488f 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a8488f 000d:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42b065ca) ret=42a848c0 000d:Ret gdi32.CreateBitmap() retval=000002fc ret=42a848c0 000d:Call gdi32.CreatePatternBrush(000002fc) ret=42a848d0 000d:Ret gdi32.CreatePatternBrush() retval=00000304 ret=42a848d0 000d:Call gdi32.DeleteObject(000002fc) ret=42a848de 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a848de 000d:Ret comctl32.ImageList_Create() retval=00140700 ret=42686576 000d:Call comctl32.ImageList_SetBkColor(0013eca0,ffffffff) ret=42686599 000d:Ret comctl32.ImageList_SetBkColor() retval=ffffffff ret=42686599 000d:Call comctl32.ImageList_SetBkColor(00140700,ffffffff) ret=426865b4 000d:Ret comctl32.ImageList_SetBkColor() retval=ffffffff ret=426865b4 000d:Call user32.LoadImageA(42660000,00000001,00000001,00000010,00000010,00008000) ret=426865e7 000d:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000d 000d:trace:seh:raise_exception info[0]=00000001 000d:trace:seh:raise_exception info[1]=00360000 000d:trace:seh:raise_exception eax=9999cccc ebx=00000328 ecx=000000ac edx=00000067 esi=00000001 edi=00360000 000d:trace:seh:raise_exception ebp=0033f7c8 esp=0033f740 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010a02 000d:trace:seh:call_vectored_handlers calling handler at 0x432dbc30 code=c0000005 flags=0 000d:trace:seh:call_vectored_handlers handler at 0x432dbc30 returned ffffffff 000d:Ret user32.LoadImageA() retval=0001002a ret=426865e7 000d:Call user32.LoadImageA(42660000,00000001,00000001,00000020,00000020,00008000) ret=4268661c 000d:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000d 000d:trace:seh:raise_exception info[0]=00000001 000d:trace:seh:raise_exception info[1]=00370000 000d:trace:seh:raise_exception eax=00000000 ebx=0000034c ecx=00000000 edx=00000000 esi=00000001 edi=00370000 000d:trace:seh:raise_exception ebp=0033f7c8 esp=0033f740 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010246 000d:trace:seh:call_vectored_handlers calling handler at 0x432dbc30 code=c0000005 flags=0 000d:trace:seh:call_vectored_handlers handler at 0x432dbc30 returned ffffffff 000d:Ret user32.LoadImageA() retval=0001002c ret=4268661c 000d:Call KERNEL32.LoadLibraryA(426f6834 "ole32.dll") ret=426d9a6b 000d:Call PE DLL (proc=0x42ce72f0,module=0x42ca0000 L"rpcrt4.dll",reason=PROCESS_ATTACH,res=0x0) 000d:Ret PE DLL (proc=0x42ce72f0,module=0x42ca0000 L"rpcrt4.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000d:Call PE DLL (proc=0x42c35760,module=0x42b60000 L"ole32.dll",reason=PROCESS_ATTACH,res=0x0) 000d:Call user32.RegisterClassW(0033f368) ret=42b8184a 000d:Ret user32.RegisterClassW() retval=0000c02f ret=42b8184a 000d:Ret PE DLL (proc=0x42c35760,module=0x42b60000 L"ole32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000d:Ret KERNEL32.LoadLibraryA() retval=42b60000 ret=426d9a6b 000d:Call KERNEL32.GetProcAddress(42b60000,426f68b3 "CoTaskMemAlloc") ret=426d9a3c 000d:Ret KERNEL32.GetProcAddress() retval=42b6edd8 ret=426d9a3c 000d:Call ole32.CoTaskMemAlloc(00000014) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145618 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145618 ret=4269c0ac 000d:Call KERNEL32.GetFullPathNameW(4282d1e0 L"C:\\windows\\system32\\shell32.dll",00000104,0033faa8,00000000) ret=426856e6 000d:Ret KERNEL32.GetFullPathNameW() retval=0000001f ret=426856e6 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000040) ret=4268572e 000d:Ret ntdll.RtlAllocateHeap() retval=00146420 ret=4268572e 000d:Call comctl32.334(0013ea88,00007fff,00145618) ret=42685791 000d:Ret comctl32.334() retval=00000000 ret=42685791 000d:Call comctl32.ImageList_ReplaceIcon(0013eca0,ffffffff,0001002a) ret=426857bd 000d:Call user32.CopyImage(0001002a,00000001,00000010,00000010,00004000) ret=42a80bfc 000d:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000d 000d:trace:seh:raise_exception info[0]=00000001 000d:trace:seh:raise_exception info[1]=00380000 000d:trace:seh:raise_exception eax=9999cccc ebx=00000370 ecx=000000ac edx=00000067 esi=00000001 edi=00380000 000d:trace:seh:raise_exception ebp=0033f5d8 esp=0033f550 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010a02 000d:trace:seh:call_vectored_handlers calling handler at 0x432dbc30 code=c0000005 flags=0 000d:trace:seh:call_vectored_handlers handler at 0x432dbc30 returned ffffffff 000d:Ret user32.CopyImage() retval=0001002e ret=42a80bfc 000d:Call user32.GetIconInfo(0001002e,0033f97c) ret=42a80c27 000d:Ret user32.GetIconInfo() retval=00000001 ret=42a80c27 000d:Call gdi32.GetObjectW(000003a8,00000018,0033f964) ret=42a80c4c 000d:Ret gdi32.GetObjectW() retval=00000018 ret=42a80c4c 000d:Call gdi32.CreateCompatibleDC(00000000) ret=42a80c6d 000d:Ret gdi32.CreateCompatibleDC() retval=000003ac ret=42a80c6d 000d:Call gdi32.GetObjectW(0000038c,00000018,0033f8d8) ret=42a803de 000d:Ret gdi32.GetObjectW() retval=00000018 ret=42a803de 000d:Call gdi32.SelectObject(000003ac,0000038c) ret=42a80411 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a80411 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=42a80438 000d:Ret ntdll.RtlAllocateHeap() retval=001480a8 ret=42a80438 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000400) ret=42a804b7 000d:Ret ntdll.RtlAllocateHeap() retval=001484d8 ret=42a804b7 000d:Call gdi32.GetDIBits(000003ac,0000038c,00000000,00000010,001484d8,001480a8,00000000) ret=42a804f3 000d:Ret gdi32.GetDIBits() retval=fffffff0 ret=42a804f3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42a8054c 000d:Ret ntdll.RtlAllocateHeap() retval=00145170 ret=42a8054c 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,00000400) ret=42a805d7 000d:Ret ntdll.RtlAllocateHeap() retval=001488e0 ret=42a805d7 000d:Call gdi32.GetDIBits(000003ac,000003a8,00000000,00000010,001488e0,00145170,00000000) ret=42a80619 000d:Ret gdi32.GetDIBits() retval=fffffff0 ret=42a80619 000d:Call gdi32.StretchDIBits(00000298,00000000,00000000,00000010,00000010,00000000,00000000,00000010,00000010,001484d8,001480a8,00000000,00cc0020) ret=42a80a8a 000d:Ret gdi32.StretchDIBits() retval=00000010 ret=42a80a8a 000d:Call gdi32.StretchDIBits(000002a4,00000000,00000000,00000010,00000010,00000000,00000000,00000010,00000010,001488e0,00145170,00000000,00cc0020) ret=42a8086d 000d:Ret gdi32.StretchDIBits() retval=00000010 ret=42a8086d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001480a8) ret=42a808c2 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145170) ret=42a808e5 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808e5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001484d8) ret=42a80908 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a80908 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001488e0) ret=42a8092b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a8092b 000d:Call user32.DestroyIcon(0001002e) ret=42a80e07 000d:Ret user32.DestroyIcon() retval=00000001 ret=42a80e07 000d:Call gdi32.DeleteDC(000003ac) ret=42a80e1c 000d:Ret gdi32.DeleteDC() retval=00000001 ret=42a80e1c 000d:Call gdi32.DeleteObject(0000038c) ret=42a80e2e 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e2e 000d:Call gdi32.DeleteObject(000003a8) ret=42a80e40 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e40 000d:Ret comctl32.ImageList_ReplaceIcon() retval=00000000 ret=426857bd 000d:Call comctl32.ImageList_ReplaceIcon(00140700,ffffffff,0001002c) ret=426857e1 000d:Call user32.CopyImage(0001002c,00000001,00000020,00000020,00004000) ret=42a80bfc 000d:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000d 000d:trace:seh:raise_exception info[0]=00000001 000d:trace:seh:raise_exception info[1]=00380000 000d:trace:seh:raise_exception eax=00000000 ebx=000003f8 ecx=00000000 edx=00000000 esi=00000001 edi=00380000 000d:trace:seh:raise_exception ebp=0033f5d8 esp=0033f550 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010246 000d:trace:seh:call_vectored_handlers calling handler at 0x432dbc30 code=c0000005 flags=0 000d:trace:seh:call_vectored_handlers handler at 0x432dbc30 returned ffffffff 000d:Ret user32.CopyImage() retval=0002002e ret=42a80bfc 000d:Call user32.GetIconInfo(0002002e,0033f97c) ret=42a80c27 000d:Ret user32.GetIconInfo() retval=00000001 ret=42a80c27 000d:Call gdi32.GetObjectW(00000430,00000018,0033f964) ret=42a80c4c 000d:Ret gdi32.GetObjectW() retval=00000018 ret=42a80c4c 000d:Call gdi32.CreateCompatibleDC(00000000) ret=42a80c6d 000d:Ret gdi32.CreateCompatibleDC() retval=00000434 ret=42a80c6d 000d:Call gdi32.GetObjectW(00000414,00000018,0033f8d8) ret=42a803de 000d:Ret gdi32.GetObjectW() retval=00000018 ret=42a803de 000d:Call gdi32.SelectObject(00000434,00000414) ret=42a80411 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a80411 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=42a80438 000d:Ret ntdll.RtlAllocateHeap() retval=00148cb8 ret=42a80438 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=42a804b7 000d:Ret ntdll.RtlAllocateHeap() retval=001490e8 ret=42a804b7 000d:Call gdi32.GetDIBits(00000434,00000414,00000000,00000020,001490e8,00148cb8,00000000) ret=42a804f3 000d:Ret gdi32.GetDIBits() retval=ffffffe0 ret=42a804f3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42a8054c 000d:Ret ntdll.RtlAllocateHeap() retval=001452e0 ret=42a8054c 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,00001000) ret=42a805d7 000d:Ret ntdll.RtlAllocateHeap() retval=0014a0f0 ret=42a805d7 000d:Call gdi32.GetDIBits(00000434,00000430,00000000,00000020,0014a0f0,001452e0,00000000) ret=42a80619 000d:Ret gdi32.GetDIBits() retval=ffffffe0 ret=42a80619 000d:Call gdi32.StretchDIBits(000002d0,00000000,00000000,00000020,00000020,00000000,00000000,00000020,00000020,001490e8,00148cb8,00000000,00cc0020) ret=42a80a8a 000d:Ret gdi32.StretchDIBits() retval=00000020 ret=42a80a8a 000d:Call gdi32.StretchDIBits(000002dc,00000000,00000000,00000020,00000020,00000000,00000000,00000020,00000020,0014a0f0,001452e0,00000000,00cc0020) ret=42a8086d 000d:Ret gdi32.StretchDIBits() retval=00000020 ret=42a8086d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00148cb8) ret=42a808c2 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001452e0) ret=42a808e5 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808e5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001490e8) ret=42a80908 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a80908 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0014a0f0) ret=42a8092b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a8092b 000d:Call user32.DestroyIcon(0002002e) ret=42a80e07 000d:Ret user32.DestroyIcon() retval=00000001 ret=42a80e07 000d:Call gdi32.DeleteDC(00000434) ret=42a80e1c 000d:Ret gdi32.DeleteDC() retval=00000001 ret=42a80e1c 000d:Call gdi32.DeleteObject(00000414) ret=42a80e2e 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e2e 000d:Call gdi32.DeleteObject(00000430) ret=42a80e40 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e40 000d:Ret comctl32.ImageList_ReplaceIcon() retval=00000000 ret=426857e1 000d:Call ole32.CoTaskMemAlloc(00000014) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145638 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145638 ret=4269c0ac 000d:Call KERNEL32.GetFullPathNameW(4282d1e0 L"C:\\windows\\system32\\shell32.dll",00000104,0033faa8,00000000) ret=426856e6 000d:Ret KERNEL32.GetFullPathNameW() retval=0000001f ret=426856e6 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000040) ret=4268572e 000d:Ret ntdll.RtlAllocateHeap() retval=00146468 ret=4268572e 000d:Call comctl32.334(0013ea88,00007fff,00145638) ret=42685791 000d:Ret comctl32.334() retval=00000001 ret=42685791 000d:Call comctl32.ImageList_ReplaceIcon(0013eca0,ffffffff,0001002a) ret=426857bd 000d:Call user32.CopyImage(0001002a,00000001,00000010,00000010,00004000) ret=42a80bfc 000d:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000d 000d:trace:seh:raise_exception info[0]=00000001 000d:trace:seh:raise_exception info[1]=00380000 000d:trace:seh:raise_exception eax=9999cccc ebx=00000480 ecx=000000ac edx=00000067 esi=00000001 edi=00380000 000d:trace:seh:raise_exception ebp=0033f5d8 esp=0033f550 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010a02 000d:trace:seh:call_vectored_handlers calling handler at 0x432dbc30 code=c0000005 flags=0 000d:trace:seh:call_vectored_handlers handler at 0x432dbc30 returned ffffffff 000d:Ret user32.CopyImage() retval=0003002e ret=42a80bfc 000d:Call user32.GetIconInfo(0003002e,0033f97c) ret=42a80c27 000d:Ret user32.GetIconInfo() retval=00000001 ret=42a80c27 000d:Call gdi32.GetObjectW(000004b8,00000018,0033f964) ret=42a80c4c 000d:Ret gdi32.GetObjectW() retval=00000018 ret=42a80c4c 000d:Call gdi32.CreateCompatibleDC(00000000) ret=42a7f859 000d:Ret gdi32.CreateCompatibleDC() retval=000004bc ret=42a7f859 000d:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42a6c623 000d:Ret KERNEL32.LocalAlloc() retval=00146510 ret=42a6c623 000d:Call gdi32.CreateDIBSection(000004bc,00146510,00000000,0033f87c,00000000,00000000) ret=42a7f5b7 000d:Ret gdi32.CreateDIBSection() retval=000004c8 ret=42a7f5b7 000d:Call KERNEL32.LocalFree(00146510) ret=42a6c36b 000d:Ret KERNEL32.LocalFree() retval=00000000 ret=42a6c36b 000d:Call gdi32.SelectObject(000004bc,000004c8) ret=42a7f9a2 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a7f9a2 000d:Call gdi32.BitBlt(000004bc,00000000,00000000,00000040,00000090,00000298,00000000,00000000,00cc0020) ret=42a7f9ef 000d:Ret gdi32.BitBlt() retval=00000001 ret=42a7f9ef 000d:Call gdi32.SelectObject(000004bc,0000006c) ret=42a7fa01 000d:Ret gdi32.SelectObject() retval=000004c8 ret=42a7fa01 000d:Call gdi32.SelectObject(00000298,000004c8) ret=42a7f891 000d:Ret gdi32.SelectObject() retval=000002b0 ret=42a7f891 000d:Call gdi32.DeleteObject(000002b0) ret=42a7f89f 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a7f89f 000d:Call gdi32.CreateBitmap(00000040,00000090,00000001,00000001,00000000) ret=42a7f93a 000d:Ret gdi32.CreateBitmap() retval=000004cc ret=42a7f93a 000d:Call gdi32.SelectObject(000004bc,000004cc) ret=42a7faa7 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a7faa7 000d:Call gdi32.BitBlt(000004bc,00000000,00000000,00000040,00000090,000002a4,00000000,00000000,00cc0020) ret=42a7faf4 000d:Ret gdi32.BitBlt() retval=00000001 ret=42a7faf4 000d:Call gdi32.SelectObject(000004bc,0000006c) ret=42a7fb06 000d:Ret gdi32.SelectObject() retval=000004cc ret=42a7fb06 000d:Call gdi32.SelectObject(000002a4,000004cc) ret=42a7f965 000d:Ret gdi32.SelectObject() retval=000002b4 ret=42a7f965 000d:Call gdi32.DeleteObject(000002b4) ret=42a7f973 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a7f973 000d:Call ntdll.RtlReAllocateHeap(00110000,00000008,0013f288,00000022) ret=42a7f8dc 000d:Ret ntdll.RtlReAllocateHeap() retval=0013f288 ret=42a7f8dc 000d:Call gdi32.DeleteDC(000004bc) ret=42a7f8fe 000d:Ret gdi32.DeleteDC() retval=00000001 ret=42a7f8fe 000d:Call gdi32.CreateCompatibleDC(00000000) ret=42a80c6d 000d:Ret gdi32.CreateCompatibleDC() retval=000004d0 ret=42a80c6d 000d:Call gdi32.GetObjectW(0000049c,00000018,0033f8d8) ret=42a803de 000d:Ret gdi32.GetObjectW() retval=00000018 ret=42a803de 000d:Call gdi32.SelectObject(000004d0,0000049c) ret=42a80411 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a80411 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=42a80438 000d:Ret ntdll.RtlAllocateHeap() retval=0013f2b8 ret=42a80438 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000400) ret=42a804b7 000d:Ret ntdll.RtlAllocateHeap() retval=0013f6e8 ret=42a804b7 000d:Call gdi32.GetDIBits(000004d0,0000049c,00000000,00000010,0013f6e8,0013f2b8,00000000) ret=42a804f3 000d:Ret gdi32.GetDIBits() retval=fffffff0 ret=42a804f3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42a8054c 000d:Ret ntdll.RtlAllocateHeap() retval=001464e8 ret=42a8054c 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,00000400) ret=42a805d7 000d:Ret ntdll.RtlAllocateHeap() retval=0013faf0 ret=42a805d7 000d:Call gdi32.GetDIBits(000004d0,000004b8,00000000,00000010,0013faf0,001464e8,00000000) ret=42a80619 000d:Ret gdi32.GetDIBits() retval=fffffff0 ret=42a80619 000d:Call gdi32.StretchDIBits(00000298,00000010,00000000,00000010,00000010,00000000,00000000,00000010,00000010,0013f6e8,0013f2b8,00000000,00cc0020) ret=42a80a8a 000d:Ret gdi32.StretchDIBits() retval=00000010 ret=42a80a8a 000d:Call gdi32.StretchDIBits(000002a4,00000010,00000000,00000010,00000010,00000000,00000000,00000010,00000010,0013faf0,001464e8,00000000,00cc0020) ret=42a8086d 000d:Ret gdi32.StretchDIBits() retval=00000010 ret=42a8086d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f2b8) ret=42a808c2 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464e8) ret=42a808e5 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808e5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f6e8) ret=42a80908 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a80908 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013faf0) ret=42a8092b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a8092b 000d:Call user32.DestroyIcon(0003002e) ret=42a80e07 000d:Ret user32.DestroyIcon() retval=00000001 ret=42a80e07 000d:Call gdi32.DeleteDC(000004d0) ret=42a80e1c 000d:Ret gdi32.DeleteDC() retval=00000001 ret=42a80e1c 000d:Call gdi32.DeleteObject(0000049c) ret=42a80e2e 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e2e 000d:Call gdi32.DeleteObject(000004b8) ret=42a80e40 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e40 000d:Ret comctl32.ImageList_ReplaceIcon() retval=00000001 ret=426857bd 000d:Call comctl32.ImageList_ReplaceIcon(00140700,ffffffff,0001002c) ret=426857e1 000d:Call user32.CopyImage(0001002c,00000001,00000020,00000020,00004000) ret=42a80bfc 000d:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000d 000d:trace:seh:raise_exception info[0]=00000001 000d:trace:seh:raise_exception info[1]=00340000 000d:trace:seh:raise_exception eax=00000000 ebx=0000051c ecx=00000000 edx=00000000 esi=00000001 edi=00340000 000d:trace:seh:raise_exception ebp=0033f5d8 esp=0033f550 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010246 000d:trace:seh:call_vectored_handlers calling handler at 0x432dbc30 code=c0000005 flags=0 000d:trace:seh:call_vectored_handlers handler at 0x432dbc30 returned ffffffff 000d:Ret user32.CopyImage() retval=0004002e ret=42a80bfc 000d:Call user32.GetIconInfo(0004002e,0033f97c) ret=42a80c27 000d:Ret user32.GetIconInfo() retval=00000001 ret=42a80c27 000d:Call gdi32.GetObjectW(00000554,00000018,0033f964) ret=42a80c4c 000d:Ret gdi32.GetObjectW() retval=00000018 ret=42a80c4c 000d:Call gdi32.CreateCompatibleDC(00000000) ret=42a7f859 000d:Ret gdi32.CreateCompatibleDC() retval=00000558 ret=42a7f859 000d:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42a6c623 000d:Ret KERNEL32.LocalAlloc() retval=00140378 ret=42a6c623 000d:Call gdi32.CreateDIBSection(00000558,00140378,00000000,0033f87c,00000000,00000000) ret=42a7f5b7 000d:Ret gdi32.CreateDIBSection() retval=00000564 ret=42a7f5b7 000d:Call KERNEL32.LocalFree(00140378) ret=42a6c36b 000d:Ret KERNEL32.LocalFree() retval=00000000 ret=42a6c36b 000d:Call gdi32.SelectObject(00000558,00000564) ret=42a7f9a2 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a7f9a2 000d:Call gdi32.BitBlt(00000558,00000000,00000000,00000080,00000120,000002d0,00000000,00000000,00cc0020) ret=42a7f9ef 000d:Ret gdi32.BitBlt() retval=00000001 ret=42a7f9ef 000d:Call gdi32.SelectObject(00000558,0000006c) ret=42a7fa01 000d:Ret gdi32.SelectObject() retval=00000564 ret=42a7fa01 000d:Call gdi32.SelectObject(000002d0,00000564) ret=42a7f891 000d:Ret gdi32.SelectObject() retval=000002e8 ret=42a7f891 000d:Call gdi32.DeleteObject(000002e8) ret=42a7f89f 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a7f89f 000d:Call gdi32.CreateBitmap(00000080,00000120,00000001,00000001,00000000) ret=42a7f93a 000d:Ret gdi32.CreateBitmap() retval=00000568 ret=42a7f93a 000d:Call gdi32.SelectObject(00000558,00000568) ret=42a7faa7 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a7faa7 000d:Call gdi32.BitBlt(00000558,00000000,00000000,00000080,00000120,000002dc,00000000,00000000,00cc0020) ret=42a7faf4 000d:Ret gdi32.BitBlt() retval=00000001 ret=42a7faf4 000d:Call gdi32.SelectObject(00000558,0000006c) ret=42a7fb06 000d:Ret gdi32.SelectObject() retval=00000568 ret=42a7fb06 000d:Call gdi32.SelectObject(000002dc,00000568) ret=42a7f965 000d:Ret gdi32.SelectObject() retval=000002ec ret=42a7f965 000d:Call gdi32.DeleteObject(000002ec) ret=42a7f973 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a7f973 000d:Call ntdll.RtlReAllocateHeap(00110000,00000008,00140ce8,00000022) ret=42a7f8dc 000d:Ret ntdll.RtlReAllocateHeap() retval=00140ce8 ret=42a7f8dc 000d:Call gdi32.DeleteDC(00000558) ret=42a7f8fe 000d:Ret gdi32.DeleteDC() retval=00000001 ret=42a7f8fe 000d:Call gdi32.CreateCompatibleDC(00000000) ret=42a80c6d 000d:Ret gdi32.CreateCompatibleDC() retval=0000056c ret=42a80c6d 000d:Call gdi32.GetObjectW(00000538,00000018,0033f8d8) ret=42a803de 000d:Ret gdi32.GetObjectW() retval=00000018 ret=42a803de 000d:Call gdi32.SelectObject(0000056c,00000538) ret=42a80411 000d:Ret gdi32.SelectObject() retval=0000006c ret=42a80411 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=42a80438 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42a80438 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=42a804b7 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=42a804b7 000d:Call gdi32.GetDIBits(0000056c,00000538,00000000,00000020,00140d18,00147b50,00000000) ret=42a804f3 000d:Ret gdi32.GetDIBits() retval=ffffffe0 ret=42a804f3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42a8054c 000d:Ret ntdll.RtlAllocateHeap() retval=001464f0 ret=42a8054c 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,00001000) ret=42a805d7 000d:Ret ntdll.RtlAllocateHeap() retval=00141d20 ret=42a805d7 000d:Call gdi32.GetDIBits(0000056c,00000554,00000000,00000020,00141d20,001464f0,00000000) ret=42a80619 000d:Ret gdi32.GetDIBits() retval=ffffffe0 ret=42a80619 000d:Call gdi32.StretchDIBits(000002d0,00000020,00000000,00000020,00000020,00000000,00000000,00000020,00000020,00140d18,00147b50,00000000,00cc0020) ret=42a80a8a 000d:Ret gdi32.StretchDIBits() retval=00000020 ret=42a80a8a 000d:Call gdi32.StretchDIBits(000002dc,00000020,00000000,00000020,00000020,00000000,00000000,00000020,00000020,00141d20,001464f0,00000000,00cc0020) ret=42a8086d 000d:Ret gdi32.StretchDIBits() retval=00000020 ret=42a8086d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42a808c2 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464f0) ret=42a808e5 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808e5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42a80908 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a80908 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00141d20) ret=42a8092b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a8092b 000d:Call user32.DestroyIcon(0004002e) ret=42a80e07 000d:Ret user32.DestroyIcon() retval=00000001 ret=42a80e07 000d:Call gdi32.DeleteDC(0000056c) ret=42a80e1c 000d:Ret gdi32.DeleteDC() retval=00000001 ret=42a80e1c 000d:Call gdi32.DeleteObject(00000538) ret=42a80e2e 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e2e 000d:Call gdi32.DeleteObject(00000554) ret=42a80e40 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e40 000d:Ret comctl32.ImageList_ReplaceIcon() retval=00000001 ret=426857e1 000d:Ret PE DLL (proc=0x426d9ab0,module=0x42660000 L"shell32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 000d:Starting process L"C:\\windows\\system32\\winemenubuilder.exe" (entryproc=0x401ca2c0) 000d:Call KERNEL32.GetCommandLineW() ret=401ca30d 000d:Ret KERNEL32.GetCommandLineW() retval=00220608 ret=401ca30d 000d:Call KERNEL32.GetStartupInfoW(0033fe5c) ret=401ca36b 000d:Ret KERNEL32.GetStartupInfoW() retval=0033fe5c ret=401ca36b 000d:Call KERNEL32.GetModuleHandleW(00000000) ret=401ca38f 000d:Ret KERNEL32.GetModuleHandleW() retval=401b0000 ret=401ca38f 000d:Call shell32.SHGetFolderPathW(00000000,00000000,00000000,00000000,0033fc00) ret=401c8824 000d:Call advapi32.RegCreateKeyW(80000001,426e9940 L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders",0033f4d0) ret=426a445c 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=426a445c 000d:Call advapi32.RegCreateKeyW(80000001,426e98a0 L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders",0033f4d4) ret=426a4480 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=426a4480 000d:Call advapi32.RegQueryValueExW(00000038,426e9820 L"Desktop",00000000,0033f4dc,0033f604,0033f4d8) ret=426a44bd 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426a44bd 000d:Call advapi32.RegCreateKeyExW(80000002,426e9b40 L"Software\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList",00000000,00000000,00000000,000f003f,00000000,0033ee4c,0033ee48) ret=426a240e 000d:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=426a240e 000d:Call KERNEL32.GetSystemDirectoryW(0033e830,00000104) ret=426a244b 000d:Ret KERNEL32.GetSystemDirectoryW() retval=00000013 ret=426a244b 000d:Call advapi32.RegQueryValueExW(0000003c,426e9a40 L"ProfilesDirectory",00000000,0033e79c,0033ea38,0033e798) ret=426a1ff7 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426a1ff7 000d:Call advapi32.GetUserNameW(0033e830,0033ee48) ret=426a26b9 000d:Ret advapi32.GetUserNameW() retval=00000001 ret=426a26b9 000d:Call shlwapi.PathAppendW(0033eeb8 L"C:\\users",0033e830 L"nordam") ret=426a26ce 000d:Ret shlwapi.PathAppendW() retval=00000001 ret=426a26ce 000d:Call shlwapi.PathAppendW(0033eeb8 L"C:\\users\\nordam",0033ec5a L"\\Desktop") ret=426a2700 000d:Ret shlwapi.PathAppendW() retval=00000001 ret=426a2700 000d:Call advapi32.RegCloseKey(0000003c) ret=426a22cb 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426a22cb 000d:Call advapi32.RegSetValueExW(00000030,426e9820 L"Desktop",00000000,00000001,0033f604,00000030) ret=426a4572 000d:Ret advapi32.RegSetValueExW() retval=00000000 ret=426a4572 000d:Call advapi32.RegCloseKey(00000030) ret=426a44d4 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426a44d4 000d:Call advapi32.RegCloseKey(00000038) ret=426a44e2 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426a44e2 000d:Call shlwapi.PathFileExistsW(0033f80c L"C:\\users\\nordam\\Desktop") ret=426a5271 000d:Call KERNEL32.SetErrorMode(00000001) ret=405ab31f 000d:Ret KERNEL32.SetErrorMode() retval=00000000 ret=405ab31f 000d:Call KERNEL32.GetFileAttributesW(0033f80c L"C:\\users\\nordam\\Desktop") ret=405ab32c 000d:Ret KERNEL32.GetFileAttributesW() retval=00000010 ret=405ab32c 000d:Call KERNEL32.SetErrorMode(00000000) ret=405ab339 000d:Ret KERNEL32.SetErrorMode() retval=00000001 ret=405ab339 000d:Ret shlwapi.PathFileExistsW() retval=00000001 ret=426a5271 000d:Ret shell32.SHGetFolderPathW() retval=00000000 ret=401c8824 000d:Call KERNEL32.wine_get_unix_file_name(0033fc00 L"C:\\users\\nordam\\Desktop") ret=401c8839 000d:Ret KERNEL32.wine_get_unix_file_name() retval=001476c8 ret=401c8839 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c36e4 000d:Ret ntdll.RtlAllocateHeap() retval=0013f2b8 ret=401c36e4 000d:Call ntdll.RtlReAllocateHeap(00110000,00000000,0013f2b8,00000030) ret=401c3742 000d:Ret ntdll.RtlReAllocateHeap() retval=0013f2b8 ret=401c3742 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c36e4 000d:Ret ntdll.RtlAllocateHeap() retval=0013f2f0 ret=401c36e4 000d:Call ntdll.RtlReAllocateHeap(00110000,00000000,0013f2f0,0000001b) ret=401c3742 000d:Ret ntdll.RtlReAllocateHeap() retval=0013f2f0 ret=401c3742 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c36e4 000d:Ret ntdll.RtlAllocateHeap() retval=0013f318 ret=401c36e4 000d:Call ntdll.RtlReAllocateHeap(00110000,00000000,0013f318,0000002f) ret=401c3742 000d:Ret ntdll.RtlReAllocateHeap() retval=0013f318 ret=401c3742 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f318) ret=401c891d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c891d 000d:Call KERNEL32.CreateSemaphoreA(00000000,00000001,00000001,401cac38 "winemenubuilder_semaphore") ret=401c8c10 000d:Ret KERNEL32.CreateSemaphoreA() retval=00000030 ret=401c8c10 000d:Call user32.MsgWaitForMultipleObjects(00000001,0033fe08,00000000,ffffffff,000004ff) ret=401c8c41 000d:Ret user32.MsgWaitForMultipleObjects() retval=00000000 ret=401c8c41 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c36e4 000d:Ret ntdll.RtlAllocateHeap() retval=0013f318 ret=401c36e4 000d:Call ntdll.RtlReAllocateHeap(00110000,00000000,0013f318,00000020) ret=401c3742 000d:Ret ntdll.RtlReAllocateHeap() retval=0013f318 ret=401c3742 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c36e4 000d:Ret ntdll.RtlAllocateHeap() retval=0013f340 ret=401c36e4 000d:Call ntdll.RtlReAllocateHeap(00110000,00000000,0013f340,00000029) ret=401c3742 000d:Ret ntdll.RtlReAllocateHeap() retval=0013f340 ret=401c3742 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c36e4 000d:Ret ntdll.RtlAllocateHeap() retval=0013f378 ret=401c36e4 000d:Call ntdll.RtlReAllocateHeap(00110000,00000000,0013f378,00000028) ret=401c3742 000d:Ret ntdll.RtlReAllocateHeap() retval=0013f378 ret=401c3742 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c36e4 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c36e4 000d:Call ntdll.RtlReAllocateHeap(00110000,00000000,00140d18,0000001e) ret=401c3742 000d:Ret ntdll.RtlReAllocateHeap() retval=00140d18 ret=401c3742 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c741a 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=401c741a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c36e4 000d:Ret ntdll.RtlAllocateHeap() retval=00140d40 ret=401c36e4 000d:Call ntdll.RtlReAllocateHeap(00110000,00000000,00140d40,00000026) ret=401c3742 000d:Ret ntdll.RtlReAllocateHeap() retval=00140d40 ret=401c3742 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c37d6 000d:Ret ntdll.RtlAllocateHeap() retval=00140d70 ret=401c37d6 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145118 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00140408 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140420 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=001464c8 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001464e0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000007) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001464f8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00146510 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001458e8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145918 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00145930 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145948 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145960 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00145978 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145990 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00145160 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000019) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145178 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001451a0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=001451b8 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000f) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001451d0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00140478 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000017) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140490 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001404b0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=001404c8 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001404e0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001404f8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00140510 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000011) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140528 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147810 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00147828 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147840 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147870 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00147888 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001478a0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001478b8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=001478d0 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000019) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001478e8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147910 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00147928 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000017) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147940 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147960 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00147978 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001452b8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147990 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=001452e0 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001452f8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145310 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00145328 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145340 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145358 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=00145370 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00145388 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=001453b8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=001453d0 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3c0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3d8 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3f0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f408 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f420 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001d) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f438 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f460 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f478 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f490 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f4a8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f4c0 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000017) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f4d8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f4f8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f510 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000f) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f528 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f540 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f558 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f570 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000007) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f588 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f5a0 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f5b8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f5d0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f5e8 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f600 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f630 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f648 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f660 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f678 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f690 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f6a8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f6c0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f6d8 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f6f0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f720 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f738 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f750 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f780 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f798 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f7b0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000007) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f7c8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f7e0 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f7f8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000007) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f810 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f828 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f840 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f858 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f870 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f888 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f8a0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f8b8 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f8d0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f8e8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f900 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f918 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f948 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f960 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000013) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f978 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f998 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013f9b0 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f9c8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013f9e8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013fa00 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013fa18 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013fa30 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013fa48 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013fa60 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013fa78 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013fa90 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013faa8 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000007) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013fac0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c3977 000d:Ret ntdll.RtlAllocateHeap() retval=0013fad8 ret=401c3977 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013faf0 ret=401c03bb 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb08 ret=401c03bb 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d70) ret=401c3908 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c3908 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c3887 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c3887 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d40) ret=401c38b5 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c38b5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c36e4 000d:Ret ntdll.RtlAllocateHeap() retval=00140d40 ret=401c36e4 000d:Call ntdll.RtlReAllocateHeap(00110000,00000000,00140d40,0000001d) ret=401c3742 000d:Ret ntdll.RtlReAllocateHeap() retval=00140d40 ret=401c3742 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d40) ret=401c38b5 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c38b5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=401c36e4 000d:Ret ntdll.RtlAllocateHeap() retval=00140d40 ret=401c36e4 000d:Call ntdll.RtlReAllocateHeap(00110000,00000000,00140d40,00000017) ret=401c3742 000d:Ret ntdll.RtlReAllocateHeap() retval=00140d40 ret=401c3742 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d40) ret=401c38b5 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c38b5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c74a6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c74a6 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000000,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".ai",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000004 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000004) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".ai",ffffffff,00140328,00000004,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000004 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call KERNEL32.LoadLibraryA(405d720d "shell32.dll") ret=405c6b0b 000d:Ret KERNEL32.LoadLibraryA() retval=42660000 ret=405c6b0b 000d:Call KERNEL32.GetProcAddress(42660000,00000066) ret=405c6adc 000d:Ret KERNEL32.GetProcAddress() retval=4266d53c ret=405c6adc 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ai",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ai",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ai",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00140340 L"\00d8\0011\00c8\0011\03d8\0014\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b50 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ai",00000000,00020019,00147b58) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b5c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b68 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b68,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b68) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000017) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ai",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000001,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".avi",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".avi",ffffffff,00140328,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".avi",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".avi",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".avi",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140340,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00140340 L"\00d8\0011\00c8\0011o/avi",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140380 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140380 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".avi",00000000,00020019,00140388) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014038c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140360,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140380) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b50 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".avi",00000000,00020019,00147b58) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b5c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000002,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".bmp",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".bmp",ffffffff,00140328,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".bmp",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".bmp",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".bmp",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140340,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00140340 L"\00d8\0011\00c8\0011e/bmp",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140380 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140380 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".bmp",00000000,00020019,00140388) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014038c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140360,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140380) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b50 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".bmp",00000000,00020019,00147b58) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b5c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000003,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".chm",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".chm",ffffffff,00140328,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".chm",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00140340 L"chm.file",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00140340 L"chm.file",00000000,00000002,00000000,00147b50,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00140340 L"\00d8\0011\00c8\0011file",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b50 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".chm",00000000,00020019,00147b58) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b5c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140378,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00140378 L"chm.file",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b68 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00140378 L"chm.file",00000000,00000002,00000000,00147b68,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b68) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Compiled HTML Help File",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000018 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Compiled HTML Help File",ffffffff,00140378,00000018,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000018 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".chm",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b50 L"chm.file",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".chm",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671168 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147ba0 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147ba0 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".chm",00000000,00020019,00147ba8) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147bac) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b80,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b80 L"chm.file",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002a) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bb8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147bb8,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bb8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ba0) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002a) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00147b80 L"\0128\0011\0118\0011file",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147bb8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147bd8 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bb8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".chm",00000000,00020019,00147be0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147be4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bb8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147bb8,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147bb8 L"chm.file",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bb8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002a) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147bf0,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147bb8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147bd8 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bb8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".chm",00000000,00020019,00147be0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147be4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bb8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147bb8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147bb8 L"chm.file",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bb8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147bb8 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147bb8,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147bb8 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bb8) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002a) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147bf0,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147bf0 L"C:\\windows\\hh.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=00000011 ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call KERNEL32.LoadLibraryA(426f6857 "version.dll") ret=426d9a6b 000d:Call PE DLL (proc=0x436fb010,module=0x436f0000 L"lz32.dll",reason=PROCESS_ATTACH,res=0x0) 000d:Call KERNEL32.DisableThreadLibraryCalls(436f0000) ret=436fb0b8 000d:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=436fb0b8 000d:Ret PE DLL (proc=0x436fb010,module=0x436f0000 L"lz32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000d:Call PE DLL (proc=0x436e56a0,module=0x436e0000 L"version.dll",reason=PROCESS_ATTACH,res=0x0) 000d:Call KERNEL32.DisableThreadLibraryCalls(436e0000) ret=436e5748 000d:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=436e5748 000d:Ret PE DLL (proc=0x436e56a0,module=0x436e0000 L"version.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000d:Ret KERNEL32.LoadLibraryA() retval=436e0000 ret=426d9a6b 000d:Call KERNEL32.GetProcAddress(436e0000,426f6995 "GetFileVersionInfoSizeW") ret=426d9a3c 000d:Ret KERNEL32.GetProcAddress() retval=436e1034 ret=426d9a3c 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\hh.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\hh.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\hh.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f640 ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\hh") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00147d10 L"\00a8\0011\0098\0011\7377\685c\2e68\7865ez32.dll",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf8 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147bf8 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".chm",00000000,00020019,00147c00) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147c04) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147bd8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147bd8 L"chm.file",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147bd8,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147bd8 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002a) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c10 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147c10,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147c10 L"C:\\windows\\hh.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=00000011 ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c10) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\hh.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\hh.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\hh.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f640 ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\hh") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf8) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147d10 L"hh",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000003 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000003) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147d10 L"hh",ffffffff,00147bd8,00000003,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000003 ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".chm",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".chm",00000000,00000002,00000000,00147bf0,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147c10 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c10 L"chm.file",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c60 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c10 L"chm.file",ffffffff,00147c60,00000009,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c10) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".chm",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147c10 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".chm",401cb888 L"MimeType",00000002,00000000,00147c10,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c10 L"application/x-wine-extension-chm",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000021 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c78 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c10 L"application/x-wine-extension-chm",ffffffff,00147c78,00000021,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000021 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c10) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147c78 "application/x-wine-extension-chm",00147b50 "application/x-wine-extension-chm") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c78) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".chm",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147c10 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".chm",401cb8aa L"ProgID",00000002,00000000,00147c10,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c10) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".chm",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147c10 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".chm",401cb878 L"AppName",00000002,00000000,00147c10,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c10 L"hh",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000003 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000003) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c28 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c10 L"hh",ffffffff,00147c28,00000003,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000003 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c10) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147c28 "hh",00147bd8 "hh") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c28) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".chm",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147c10 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".chm",401cb89a L"DocName",00000002,00000000,00147c10,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c10) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c60) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000004,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".cpl",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".cpl",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".cpl",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"cplfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"cplfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".cpl",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b80,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b80 L"cplfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b80 L"cplfile",00000000,00000002,00000000,00140340,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Control Panel Item",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000013 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000013) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Control Panel Item",ffffffff,00147b80,00000013,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000013 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".cpl",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140328,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140328 L"cplfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".cpl",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671168 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140358 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140378 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140358) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".cpl",00000000,00020019,00140380) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140384) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140358 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140358,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140358 L"cplfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140358) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000005,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".css",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".css",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".css",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".css",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".css",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011/css",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".css",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b70,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".css",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000006,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".dib",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".dib",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".dib",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".dib",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".dib",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011e/bmp",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".dib",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b70,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".dib",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000007,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".dll",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".dll",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".dll",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"dllfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=426713d0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".dll",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b50 L"dllfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=426712e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".dll",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000032) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000032) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011il\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".dll",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000032) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140340,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000019) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".dll",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140328,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140328 L"dllfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000008,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".eps",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".eps",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".eps",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".eps",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".eps",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ic\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".eps",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140340,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000017) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".eps",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000009,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000000a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".gif",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".gif",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gif",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"giffile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"giffile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gif",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b70,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"giffile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"giffile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"GIF Image",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"GIF Image",ffffffff,00147b70,0000000a,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gif",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b88 L"giffile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gif",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b88 L"\00a8\0011\0098\0011e/gif",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gif",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gif",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"giffile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147bd8,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00147bd8 L"\7f28\0014\00f8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gif",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"giffile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c58 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147c58,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c58) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gif",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"giffile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140340,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140340 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c58 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147c58,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147c5a L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c58) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147c58 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147c58,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c58) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call KERNEL32.GetProcAddress(436e0000,426f69ad "GetFileVersionInfoW") ret=426d9a3c 000d:Ret KERNEL32.GetProcAddress() retval=436e104c ret=426d9a3c 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147c58 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147c58,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c58) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call KERNEL32.GetProcAddress(436e0000,426f69c1 "VerQueryValueW") ret=426d9a3c 000d:Ret KERNEL32.GetProcAddress() retval=436e10dc ret=426d9a3c 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00140340 L"\00d8\0011\00c8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140388 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140388 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gif",00000000,00020019,00140390) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140394) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140368,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140368 L"giffile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140368,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140368 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c58 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147c58,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147c5a L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c58) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147c58 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147c58,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c58) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147c58 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147c58,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c58) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140388) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00140368,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".gif",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00140380 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".gif",00000000,00000002,00000000,00140380,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147c58 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c58 L"giffile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147ca0 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c58 L"giffile",ffffffff,00147ca0,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c58) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".gif",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147cb8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".gif",401cb888 L"MimeType",00000002,00000000,00147cb8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147cb8 L"image/gif",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147cd8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147cb8 L"image/gif",ffffffff,00147cd8,0000000a,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147cb8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147cd8 "image/gif",00140328 "image/gif") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147cd8) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".gif",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147cb8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".gif",401cb8aa L"ProgID",00000002,00000000,00147cb8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147cb8) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".gif",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147cb8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".gif",401cb878 L"AppName",00000002,00000000,00147cb8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147cb8 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c58 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147cb8 L"Wine core exe",ffffffff,00147c58,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147cb8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147c58 "Wine core exe",00140368 "Wine core exe") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c58) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".gif",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147cb8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".gif",401cb89a L"DocName",00000002,00000000,00147cb8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147cb8) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140380) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ca0) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000000b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".gz",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000004 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000004) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".gz",ffffffff,00147d10,00000004,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000004 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gz",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gz",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gz",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011Im\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gz",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b80,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000013) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".gz",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000000c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".hlp",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".hlp",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".hlp",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"hlpfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"hlpfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".hlp",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b70,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"hlpfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"hlpfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Help File",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Help File",ffffffff,00147b70,0000000a,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".hlp",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b88 L"hlpfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".hlp",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671168 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".hlp",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140328,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140328 L"hlpfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000048) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147bd8,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000048) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00140328 L"\00e8\0011\00d8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147bd8 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".hlp",00000000,00020019,00147be0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147be4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140378,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140378 L"hlpfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000048) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147bf0,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147bd8 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".hlp",00000000,00020019,00147be0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147be4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140378,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140378 L"hlpfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140378,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140378 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000048) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147bf0,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147bf0 L"C:\\windows\\system32\\winhlp32.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=00000020 ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\winhlp32.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\winhlp32.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147bf0,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00013504) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00013504) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00013504 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\winhlp32.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f65e ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\winhlp32") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00140378 L"\00a8\0011\0098\0011\7377\735c\7379\6574\336d\5c32\6977\686e\706c\3233\652e\6578",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf8 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147bf8 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".hlp",00000000,00020019,00147c00) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147c04) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147bd8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147bd8 L"hlpfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147bd8,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147bd8 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000048) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c10 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147c10,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147c10 L"C:\\windows\\system32\\winhlp32.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=00000020 ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c10) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\winhlp32.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\winhlp32.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147c10 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147c10,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00013504) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00013504) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00013504 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c10) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\winhlp32.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f65e ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\winhlp32") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf8) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140378 L"winhlp32",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140378 L"winhlp32",ffffffff,00147bd8,00000009,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".hlp",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".hlp",00000000,00000002,00000000,00147bf0,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147c08 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c08 L"hlpfile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c50 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c08 L"hlpfile",ffffffff,00147c50,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c08) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".hlp",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147c68 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".hlp",401cb888 L"MimeType",00000002,00000000,00147c68,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c68 L"application/x-wine-extension-hlp",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000021 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147cb8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c68 L"application/x-wine-extension-hlp",ffffffff,00147cb8,00000021,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000021 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c68) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147cb8 "application/x-wine-extension-hlp",00147b88 "application/x-wine-extension-hlp") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147cb8) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".hlp",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147c08 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".hlp",401cb8aa L"ProgID",00000002,00000000,00147c08,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c08) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".hlp",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147c08 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".hlp",401cb878 L"AppName",00000002,00000000,00147c08,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c08 L"winhlp32",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c28 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c08 L"winhlp32",ffffffff,00147c28,00000009,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c08) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147c28 "winhlp32",00147bd8 "winhlp32") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c28) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".hlp",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147c08 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".hlp",401cb89a L"DocName",00000002,00000000,00147c08,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c08) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c50) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000000d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".htc",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".htc",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htc",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htc",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htc",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000022) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000022) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011 F\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htc",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000022) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b80,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000011) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htc",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000000e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".htm",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".htm",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htm",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"htmlfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"htmlfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011file",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b98 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htm",00000000,00020019,00147ba0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147ba4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b78,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"htmlfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"htmlfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"HTML Document",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"HTML Document",ffffffff,00147b78,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htm",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b90,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b90 L"htmlfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671663 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000064) ret=42671729 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42671729 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00147bd8,0033f884) ret=42671776 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671776 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=426717d6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426717d6 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000064) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00140328 L"\00e8\0011\00d8\0011@",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147bd8 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htm",00000000,00020019,00147be0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147be4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b90,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b90 L"htmlfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671663 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000064) ret=42671729 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=42671729 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00147bf0,0033f884) ret=42671776 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671776 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=426717d6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426717d6 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147bd8 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htm",00000000,00020019,00147be0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147be4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b90,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b90 L"\00a8\0011\0098\0011/html",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf8 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147bf8 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htm",00000000,00020019,00147c00) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147c04) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147bd8,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf8) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147bd8 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c10 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147c10 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htm",00000000,00020019,00147c18) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147c1c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147bf0,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147bf0 L"htmlfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147c28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c10) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147bf0 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00147bf0 L"\00f8\0011\00e8\0011file",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147c50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147c70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htm",00000000,00020019,00147c78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147c7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147c50,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147c50 L"htmlfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c50) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147c88,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147c50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147c70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htm",00000000,00020019,00147c78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147c7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147c50,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147c50 L"htmlfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c50) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147c50 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147c50,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147c50 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c50) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147c88,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147c88 L"C:\\windows\\system32\\winebrowser.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=00000023 ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c88) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\winebrowser.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f664 ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\winebrowser") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147c50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00147c50 L"\00f8\0011\00e8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147c70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147c90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".htm",00000000,00020019,00147c98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147c9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147c70 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147c70,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147c70 L"htmlfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c70) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147c70 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147c70,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147c70 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c70) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f28 L"C:\\windows\\system32\\winebrowser.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=00000023 ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\winebrowser.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f664 ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\winebrowser") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c50 L"winebrowser",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147c70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147c50 L"winebrowser",ffffffff,00147c70,0000000c,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".htm",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147c88 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".htm",00000000,00000002,00000000,00147c88,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147ca8 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ca8 L"htmlfile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ca8 L"htmlfile",ffffffff,00147f28,00000009,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ca8) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".htm",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147ca8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".htm",401cb888 L"MimeType",00000002,00000000,00147ca8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ca8 L"text/html",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147cc8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ca8 L"text/html",ffffffff,00147cc8,0000000a,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ca8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147cc8 "text/html",00147bd8 "text/html") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147cc8) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".htm",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147ca8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".htm",401cb8aa L"ProgID",00000002,00000000,00147ca8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ca8) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".htm",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147ca8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".htm",401cb878 L"AppName",00000002,00000000,00147ca8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ca8 L"winebrowser",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147cc8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ca8 L"winebrowser",ffffffff,00147cc8,0000000c,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ca8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147cc8 "winebrowser",00147c70 "winebrowser") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147cc8) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".htm",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147ca8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".htm",401cb89a L"DocName",00000002,00000000,00147ca8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ca8) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bf0) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147bd8) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c50) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c70) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147c88) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000000f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".html",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".html",ffffffff,00147d10,00000006,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".html",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"htmlfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"htmlfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011file",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b98 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".html",00000000,00020019,00147ba0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147ba4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b78,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"htmlfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"htmlfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"HTML Document",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"HTML Document",ffffffff,00147b78,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".html",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b90,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b90 L"htmlfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671663 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000064) ret=42671729 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42671729 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00147f28,0033f884) ret=42671776 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671776 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=426717d6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426717d6 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000064) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00140328 L"\00e8\0011\00d8\0011@",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f28 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".html",00000000,00020019,00147f30) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f34) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b90,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b90 L"htmlfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671663 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000064) ret=42671729 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=42671729 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00147f40,0033f884) ret=42671776 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671776 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=426717d6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426717d6 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f28 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".html",00000000,00020019,00147f30) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f34) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b90,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b90 L"\00a8\0011\0098\0011/html",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f48 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".html",00000000,00020019,00147f50) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f54) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147f28,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f60 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".html",00000000,00020019,00147f68) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f6c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f40,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f40 L"htmlfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f78,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00147f40 L"\7bd8\0014\00f8\0011file",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa0 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc0 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147fc0 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa0) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".html",00000000,00020019,00147fc8) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147fcc) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa0 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147fa0,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147fa0 L"htmlfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa0) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fd8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fd8,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fd8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc0) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa0 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc0 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147fc0 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa0) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".html",00000000,00020019,00147fc8) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147fcc) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa0 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147fa0,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147fa0 L"htmlfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa0) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa0 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147fa0,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147fa0 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa0) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fd8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fd8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147fd8 L"C:\\windows\\system32\\winebrowser.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=00000023 ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fd8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\winebrowser.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f664 ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\winebrowser") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc0) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa0 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00147fa0 L"\7bd8\0014\00f8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc0 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fe0 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147fe0 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc0) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".html",00000000,00020019,00147fe8) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147fec) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc0 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147fc0,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147fc0 L"htmlfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc0) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc0 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147fc0,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147fc0 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc0) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147ff8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147ff8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147ff8 L"C:\\windows\\system32\\winebrowser.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=00000023 ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ff8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\winebrowser.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f664 ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\winebrowser") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fe0) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa0 L"winebrowser",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc0 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa0 L"winebrowser",ffffffff,00147fc0,0000000c,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".html",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fd8 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".html",00000000,00000002,00000000,00147fd8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147ff8 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ff8 L"htmlfile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00148048 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ff8 L"htmlfile",ffffffff,00148048,00000009,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ff8) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".html",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147ff8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".html",401cb888 L"MimeType",00000002,00000000,00147ff8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ff8 L"text/html",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00148018 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ff8 L"text/html",ffffffff,00148018,0000000a,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ff8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00148018 "text/html",00147f28 "text/html") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00148018) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".html",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147ff8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".html",401cb8aa L"ProgID",00000002,00000000,00147ff8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ff8) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".html",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147ff8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".html",401cb878 L"AppName",00000002,00000000,00147ff8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ff8 L"winebrowser",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00148018 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147ff8 L"winebrowser",ffffffff,00148018,0000000c,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ff8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00148018 "winebrowser",00147fc0 "winebrowser") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00148018) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".html",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147ff8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".html",401cb89a L"DocName",00000002,00000000,00147ff8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ff8) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa0) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc0) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fd8) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00148048) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000010,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".ico",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".ico",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ico",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ico",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ico",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011 D\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b98 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ico",00000000,00020019,00147ba0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147ba4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ico",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000011,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".inf",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".inf",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".inf",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"inffile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000024) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"inffile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000024) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".inf",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b80,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b80 L"inffile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000024) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b80 L"inffile",00000000,00000002,00000000,00140340,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Setup Information",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000012 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Setup Information",ffffffff,00147b80,00000012,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000012 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".inf",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140328,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140328 L"inffile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".inf",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671168 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140358 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140378 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140358) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".inf",00000000,00020019,00140380) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140384) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140358 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140358,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140358 L"inffile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140358) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000012,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".ini",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".ini",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ini",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"inifile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"inifile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ini",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b88 L"inifile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b88 L"inifile",00000000,00000002,00000000,00140340,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Configuration Settings",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000017 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000017) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Configuration Settings",ffffffff,00147b88,00000017,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000017 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ini",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140328,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140328 L"inifile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ini",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671168 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140358 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140378 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140358) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ini",00000000,00020019,00140380) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140384) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140358 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140358,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140358 L"inifile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140358) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140358 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00140358 L"\00c8\0011\00b8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f48 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ini",00000000,00020019,00147f50) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f54) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f28 L"inifile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f60,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f48 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ini",00000000,00020019,00147f50) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f54) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f28,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f28 L"inifile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147f28,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147f28 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f60,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f60 L"C:\\windows\\system32\\notepad.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=0000001f ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\notepad.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\notepad.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147f60,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00020ee4) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00020ee4) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00020ee4 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\notepad.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f65c ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\notepad") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00147f28 L"\7bd8\0014\00f8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f60 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ini",00000000,00020019,00147f68) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f6c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f40,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f40 L"inifile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147f40,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147f40 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f78,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f78 L"C:\\windows\\system32\\notepad.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=0000001f ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\notepad.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\notepad.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147f78,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00020ee4) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00020ee4) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00020ee4 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\notepad.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f65c ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\notepad") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"notepad",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"notepad",ffffffff,00147f40,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".ini",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f58 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".ini",00000000,00000002,00000000,00147f58,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"inifile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fb8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"inifile",ffffffff,00147fb8,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".ini",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fd0 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".ini",401cb888 L"MimeType",00000002,00000000,00147fd0,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fd0 L"application/x-wine-extension-ini",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000021 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fd0 L"application/x-wine-extension-ini",ffffffff,00147f70,00000021,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000021 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fd0) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147f70 "application/x-wine-extension-ini",00140328 "application/x-wine-extension-ini") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".ini",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".ini",401cb8aa L"ProgID",00000002,00000000,00147f70,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".ini",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".ini",401cb878 L"AppName",00000002,00000000,00147f70,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"notepad",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f88 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"notepad",ffffffff,00147f88,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147f88 "notepad",00147f40 "notepad") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f88) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".ini",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".ini",401cb89a L"DocName",00000002,00000000,00147f70,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140358) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f58) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fb8) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000013,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".its",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".its",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".its",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"ITS File",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002c) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"ITS File",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002c) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011File",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".its",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b88 L"ITS File",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002c) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b88 L"ITS File",00000000,00000002,00000000,00140340,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Internet Document Set",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000016 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Internet Document Set",ffffffff,00147b88,00000016,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000016 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".its",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140328,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140328 L"ITS File",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671663 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=42671729 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42671729 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00140360,0033f884) ret=42671776 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671776 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=426717d6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426717d6 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00140328 L"\00e8\0011\00d8\0011File",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140368 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".its",00000000,00020019,00140370) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140374) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140348,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140348 L"ITS File",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671663 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=42671729 000d:Ret ntdll.RtlAllocateHeap() retval=00140380 ret=42671729 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00140380,0033f884) ret=42671776 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671776 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140380) ret=426717d6 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426717d6 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140368 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".its",00000000,00020019,00140370) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140374) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671168 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f28 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".its",00000000,00020019,00147f30) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f34) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140378,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140378 L"ITS File",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000014,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".jfif",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".jfif",ffffffff,00147d10,00000006,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jfif",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"pjpegfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"pjpegfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011gfile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jfif",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b70,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"pjpegfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"pjpegfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"JPEG Image",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"JPEG Image",ffffffff,00147b70,0000000b,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jfif",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b88 L"pjpegfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jfif",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b88 L"\00a8\0011\0098\0011e/jpeg",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jfif",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jfif",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"pjpegfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00147f28 L"\7bd8\0014\00f8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jfif",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"pjpegfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jfif",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"pjpegfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140340,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140340 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147faa L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00140340 L"\00d8\0011\00c8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140388 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140388 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jfif",00000000,00020019,00140390) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140394) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140368,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140368 L"pjpegfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140368,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140368 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147faa L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140388) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00140368,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".jfif",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00140380 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".jfif",00000000,00000002,00000000,00140380,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000004a) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"pjpegfile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00148000 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"pjpegfile",ffffffff,00148000,0000000a,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jfif",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jfif",401cb888 L"MimeType",00000002,00000000,00147fa8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"image/jpeg",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"image/jpeg",ffffffff,00147fc8,0000000b,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147fc8 "image/jpeg",00140328 "image/jpeg") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc8) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jfif",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jfif",401cb8aa L"ProgID",00000002,00000000,00147fa8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jfif",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jfif",401cb878 L"AppName",00000002,00000000,00147fa8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fd0 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"Wine core exe",ffffffff,00147fd0,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147fd0 "Wine core exe",00140368 "Wine core exe") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fd0) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jfif",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jfif",401cb89a L"DocName",00000002,00000000,00147fa8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140380) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00148000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000015,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".jpe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".jpe",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpe",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"jpegfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"jpegfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011file",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpe",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b70,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"jpegfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"jpegfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"JPEG Image",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"JPEG Image",ffffffff,00147b70,0000000b,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpe",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b88 L"jpegfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpe",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b88 L"\00a8\0011\0098\0011e/jpeg",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpe",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpe",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"jpegfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00147f28 L"\7bd8\0014\00f8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpe",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"jpegfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpe",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"jpegfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140340,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140340 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147faa L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00140340 L"\00d8\0011\00c8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140388 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140388 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpe",00000000,00020019,00140390) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140394) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140368,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140368 L"jpegfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140368,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140368 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147faa L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140388) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00140368,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".jpe",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00140380 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".jpe",00000000,00000002,00000000,00140380,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"jpegfile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147ff8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"jpegfile",ffffffff,00147ff8,00000009,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpe",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpe",401cb888 L"MimeType",00000002,00000000,00147fa8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"image/jpeg",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"image/jpeg",ffffffff,00147fc8,0000000b,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147fc8 "image/jpeg",00140328 "image/jpeg") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc8) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpe",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpe",401cb8aa L"ProgID",00000002,00000000,00147fa8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpe",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpe",401cb878 L"AppName",00000002,00000000,00147fa8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fd0 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"Wine core exe",ffffffff,00147fd0,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147fd0 "Wine core exe",00140368 "Wine core exe") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fd0) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpe",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpe",401cb89a L"DocName",00000002,00000000,00147fa8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140380) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ff8) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000016,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".jpeg",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".jpeg",ffffffff,00147d10,00000006,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpeg",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"jpegfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"jpegfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011file",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpeg",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b70,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"jpegfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"jpegfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"JPEG Image",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"JPEG Image",ffffffff,00147b70,0000000b,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpeg",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b88 L"jpegfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpeg",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b88 L"\00a8\0011\0098\0011e/jpeg",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpeg",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpeg",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"jpegfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00147f28 L"\7bd8\0014\00f8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpeg",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"jpegfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpeg",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"jpegfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140340,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140340 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147faa L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00140340 L"\00d8\0011\00c8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140388 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140388 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpeg",00000000,00020019,00140390) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140394) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140368,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140368 L"jpegfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140368,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140368 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147faa L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140388) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00140368,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".jpeg",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00140380 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".jpeg",00000000,00000002,00000000,00140380,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"jpegfile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147ff8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"jpegfile",ffffffff,00147ff8,00000009,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpeg",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpeg",401cb888 L"MimeType",00000002,00000000,00147fa8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"image/jpeg",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"image/jpeg",ffffffff,00147fc8,0000000b,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147fc8 "image/jpeg",00140328 "image/jpeg") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc8) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpeg",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpeg",401cb8aa L"ProgID",00000002,00000000,00147fa8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpeg",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpeg",401cb878 L"AppName",00000002,00000000,00147fa8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fd0 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"Wine core exe",ffffffff,00147fd0,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147fd0 "Wine core exe",00140368 "Wine core exe") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fd0) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpeg",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpeg",401cb89a L"DocName",00000002,00000000,00147fa8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140380) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ff8) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000017,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".jpg",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".jpg",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpg",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"jpegfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"jpegfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011file",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpg",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b70,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"jpegfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"jpegfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"JPEG Image",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"JPEG Image",ffffffff,00147b70,0000000b,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpg",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b88 L"jpegfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpg",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b88 L"\00a8\0011\0098\0011e/jpeg",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpg",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpg",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"jpegfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00147f28 L"\7bd8\0014\00f8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpg",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"jpegfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpg",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"jpegfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140340,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140340 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147faa L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00140340 L"\00d8\0011\00c8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140388 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140388 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".jpg",00000000,00020019,00140390) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140394) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140368,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140368 L"jpegfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140368,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140368 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147faa L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140388) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00140368,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".jpg",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00140380 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".jpg",00000000,00000002,00000000,00140380,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"jpegfile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147ff8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"jpegfile",ffffffff,00147ff8,00000009,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpg",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpg",401cb888 L"MimeType",00000002,00000000,00147fa8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"image/jpeg",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"image/jpeg",ffffffff,00147fc8,0000000b,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147fc8 "image/jpeg",00140328 "image/jpeg") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc8) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpg",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpg",401cb8aa L"ProgID",00000002,00000000,00147fa8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpg",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpg",401cb878 L"AppName",00000002,00000000,00147fa8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fd0 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"Wine core exe",ffffffff,00147fd0,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147fd0 "Wine core exe",00140368 "Wine core exe") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fd0) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpg",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".jpg",401cb89a L"DocName",00000002,00000000,00147fa8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140380) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ff8) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000018,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".lnk",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".lnk",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"lnkfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"lnkfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".lnk",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b70,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"lnkfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"lnkfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Shortcut",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Shortcut",ffffffff,00147b70,00000009,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".lnk",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b88 L"lnkfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".lnk",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671168 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".lnk",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140328,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140328 L"lnkfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000019,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mht",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mht",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mht",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"mhtmlfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"mhtmlfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011lfile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b98 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mht",00000000,00020019,00147ba0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147ba4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b78,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"mhtmlfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"mhtmlfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"MHTML Document",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000f ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000f) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"MHTML Document",ffffffff,00147b78,0000000f,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000f ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mht",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b90,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b90 L"mhtmlfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mht",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b90,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b90 L"\00a8\0011\0098\0011age/rfc822\7b88\0014\0018",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mht",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140360,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000f) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mht",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"mhtmlfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000001a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mhtml",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000007 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000007) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mhtml",ffffffff,00147d10,00000007,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000007 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mhtml",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"mhtmlfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"mhtmlfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011lfile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b98 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mhtml",00000000,00020019,00147ba0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147ba4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b78,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"mhtmlfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"mhtmlfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"MHTML Document",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000f ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000f) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"MHTML Document",ffffffff,00147b78,0000000f,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000f ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mhtml",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b90,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b90 L"mhtmlfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mhtml",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b90,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b90 L"\00a8\0011\0098\0011age/rfc822\7b88\0014\0018",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mhtml",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001e) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140360,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000f) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mhtml",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"mhtmlfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000001b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mp3",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mp3",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mp3",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mp3",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mp3",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011o/mpeg\7b48\00149",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mp3",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b70,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mp3",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000001c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mpe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mpe",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpe",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpe",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpe",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011o/mpeg\7b48\00149",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpe",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b70,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpe",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000001d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mpeg",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mpeg",ffffffff,00147d10,00000006,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpeg",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpeg",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpeg",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011o/mpeg\7b48\00149",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpeg",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b70,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpeg",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000001e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mpg",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".mpg",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpg",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpg",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpg",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011o/mpeg\7b48\00149",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpg",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b70,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".mpg",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000001f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000020,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".png",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".png",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".png",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"pngfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"pngfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".png",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b70,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"pngfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b70 L"pngfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"PNG Image",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"PNG Image",ffffffff,00147b70,0000000a,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".png",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b88 L"pngfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".png",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b88 L"\00a8\0011\0098\0011e/png",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".png",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".png",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"pngfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000076) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000076) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00147f28 L"\7bd8\0014\00f8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome\r",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".png",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"pngfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000076) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".png",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"pngfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140340,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140340 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000076) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147faa L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00140340 L"\00d8\0011\00c8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140388 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140388 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".png",00000000,00020019,00140390) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140394) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140368,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140368 L"pngfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00140368,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00140368 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000076) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147fa8,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147faa L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,00000104,0033f626,00000000) ret=42670970 000d:Ret KERNEL32.SearchPathW() retval=0000002f ret=42670970 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=0000070c ret=426711dd 000d:Call ntdll.RtlAllocateHeap(00110000,00000008,0000070c) ret=426717fb 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=426717fb 000d:Call version.GetFileVersionInfoW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",00000000,0000070c,00140d18) ret=4267182f 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\Program Files\\Internet Explorer\\iexplore.exe",0033f454,00000000) ret=436e29aa 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e29aa 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f39c,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3dd,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f290,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147fa8,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00006858) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00006858) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00006858 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZSeek(00000044,00006ad4,00000000) ret=436e2a03 000d:Ret KERNEL32.LZSeek() retval=00006ad4 ret=436e2a03 000d:Call KERNEL32.LZRead(00000044,00140d18,00000384) ret=436e2a35 000d:Ret KERNEL32.LZRead() retval=00000384 ret=436e2a35 000d:Call KERNEL32.LZClose(00000044) ret=436e2a4c 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2a4c 000d:Ret version.GetFileVersionInfoW() retval=00000001 ret=4267182f 000d:Call version.VerQueryValueW(00140d18,426e8ca0 L"\\VarFileInfo\\Translation",0033f888,0033f884) ret=4267186c 000d:Ret version.VerQueryValueW() retval=00000001 ret=4267186c 000d:Call version.VerQueryValueW(00140d18,0033f82e L"\\StringFileInfo\\040904e4\\FileDescription",0033f888,0033f884) ret=42671907 000d:Ret version.VerQueryValueW() retval=00000001 ret=42671907 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140388) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00140368 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140340 L"Wine core exe",ffffffff,00140368,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".png",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00140380 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".png",00000000,00000002,00000000,00140380,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"pngfile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147ff0 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"pngfile",ffffffff,00147ff0,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".png",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".png",401cb888 L"MimeType",00000002,00000000,00147fa8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"image/png",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"image/png",ffffffff,00147fc8,0000000a,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147fc8 "image/png",00140328 "image/png") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc8) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".png",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".png",401cb8aa L"ProgID",00000002,00000000,00147fa8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".png",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".png",401cb878 L"AppName",00000002,00000000,00147fa8,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"Wine core exe",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fd0 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fa8 L"Wine core exe",ffffffff,00147fd0,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147fd0 "Wine core exe",00140368 "Wine core exe") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fd0) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".png",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fa8 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".png",401cb89a L"DocName",00000002,00000000,00147fa8,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fa8) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140368) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140380) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147ff0) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000021,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".ps",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000004 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000004) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".ps",ffffffff,00147d10,00000004,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000004 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ps",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ps",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ps",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011Im\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ps",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140340,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000017) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".ps",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000022,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".rtf",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".rtf",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".rtf",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"rtffile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"rtffile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".rtf",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b80,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b80 L"rtffile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b80 L"rtffile",00000000,00000002,00000000,00140340,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Rich Text Document",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000013 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000013) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Rich Text Document",ffffffff,00147b80,00000013,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000013 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".rtf",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140328,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140328 L"rtffile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".rtf",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671168 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140358 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140378 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140358) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".rtf",00000000,00020019,00140380) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140384) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140358 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140358,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140358 L"rtffile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140358) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140358 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00140358 L"\00c8\0011\00b8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f48 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".rtf",00000000,00020019,00147f50) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f54) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f28 L"rtffile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f60,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f48 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".rtf",00000000,00020019,00147f50) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f54) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f28,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f28 L"rtffile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147f28,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147f28 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f60,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f60 L"C:\\windows\\system32\\wordpad.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=0000001f ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\wordpad.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\wordpad.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147f60,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00026830) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00026830) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00026830 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\wordpad.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f65c ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\wordpad") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00147f28 L"\7bd8\0014\00f8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f60 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".rtf",00000000,00020019,00147f68) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f6c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f40,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f40 L"rtffile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147f40,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147f40 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f78,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f78 L"C:\\windows\\system32\\wordpad.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=0000001f ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\wordpad.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\wordpad.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147f78,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00026830) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00026830) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00026830 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\wordpad.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f65c ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\wordpad") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"wordpad",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"wordpad",ffffffff,00147f40,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".rtf",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f58 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".rtf",00000000,00000002,00000000,00147f58,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"rtffile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fb8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"rtffile",ffffffff,00147fb8,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".rtf",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147fd0 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".rtf",401cb888 L"MimeType",00000002,00000000,00147fd0,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fd0 L"application/x-wine-extension-rtf",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000021 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147fd0 L"application/x-wine-extension-rtf",ffffffff,00147f70,00000021,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000021 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fd0) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147f70 "application/x-wine-extension-rtf",00140328 "application/x-wine-extension-rtf") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".rtf",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".rtf",401cb8aa L"ProgID",00000002,00000000,00147f70,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".rtf",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".rtf",401cb878 L"AppName",00000002,00000000,00147f70,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"wordpad",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f88 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"wordpad",ffffffff,00147f88,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147f88 "wordpad",00147f40 "wordpad") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f88) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".rtf",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000026) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".rtf",401cb89a L"DocName",00000002,00000000,00147f70,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140358) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f58) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fb8) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000023,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".tar",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".tar",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tar",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tar",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tar",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000024) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000024) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011 T\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tar",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000024) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b80,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tar",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000024,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".tgz",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".tgz",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tgz",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tgz",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tgz",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000032) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000032) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ic\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tgz",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000032) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140340,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000019) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tgz",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000025,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".tif",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".tif",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tif",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tif",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tif",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011e/tiff\7b48\00149",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tif",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b70,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tif",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000026,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".tiff",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000006) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".tiff",ffffffff,00147d10,00000006,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tiff",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tiff",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tiff",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011e/tiff\7b48\00149",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tiff",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b70,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".tiff",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000027,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".txt",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".txt",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".txt",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"txtfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"txtfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b98 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".txt",00000000,00020019,00147ba0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147ba4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b78,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"txtfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"txtfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Text Document",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"Text Document",ffffffff,00147b78,0000000e,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000e ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".txt",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b90,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b90 L"txtfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".txt",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b90,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b90 L"\00a8\0011\0098\0011/plain",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".txt",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".txt",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"txtfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00140340 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f48 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".txt",00000000,00020019,00147f50) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f54) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f28 L"txtfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f60,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f48 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".txt",00000000,00020019,00147f50) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f54) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f28,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f28 L"txtfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147f28,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147f28 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f60,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f60 L"C:\\windows\\system32\\notepad.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=0000001f ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\notepad.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\notepad.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147f60,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00020ee4) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00020ee4) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00020ee4 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\notepad.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f65c ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\notepad") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00147f28 L"\7bd8\0014\00f8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f60 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".txt",00000000,00020019,00147f68) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f6c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f40,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f40 L"txtfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147f40,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147f40 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f78,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f78 L"C:\\windows\\system32\\notepad.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=0000001f ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\notepad.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\notepad.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147f78,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00020ee4) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00020ee4) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00020ee4 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\notepad.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f65c ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\notepad") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"notepad",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"notepad",ffffffff,00147f40,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".txt",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f58 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".txt",00000000,00000002,00000000,00147f58,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"txtfile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fb8 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"txtfile",ffffffff,00147fb8,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".txt",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000016) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".txt",401cb888 L"MimeType",00000002,00000000,00147f70,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"text/plain",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000b) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f90 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"text/plain",ffffffff,00147f90,0000000b,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000b ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147f90 "text/plain",00140328 "text/plain") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f90) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".txt",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".txt",401cb8aa L"ProgID",00000002,00000000,00147f70,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".txt",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".txt",401cb878 L"AppName",00000002,00000000,00147f70,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"notepad",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f88 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f70 L"notepad",ffffffff,00147f88,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147f88 "notepad",00147f40 "notepad") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f88) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".txt",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001c) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".txt",401cb89a L"DocName",00000002,00000000,00147f70,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f58) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fb8) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000028,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".wav",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".wav",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wav",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wav",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wav",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011o/wav",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wav",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b70,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wav",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000029,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".wri",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".wri",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wri",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"wrifile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=426713d0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wri",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b50 L"wrifile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wri",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671168 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wri",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b80,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b80 L"wrifile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00140328 L"\00e8\0011\00d8\0011@",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b80 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wri",00000000,00020019,00147b88) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b8c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b98,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b98 L"wrifile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b80 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wri",00000000,00020019,00147b88) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b8c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b98,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b98 L"wrifile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147b98,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147b98 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f28 L"C:\\windows\\system32\\wordpad.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=0000001f ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\wordpad.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\wordpad.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147f28,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00026830) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00026830) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00026830 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\wordpad.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f65c ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\wordpad") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140378 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00140378 L"\00a8\0011\0098\0011\7377\735c\7379\6574\336d\5c32\6f77\6472\6170\2e64\7865e%1\0370\0014(",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f28 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".wri",00000000,00020019,00147f30) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f34) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b80,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b80 L"wrifile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147b80,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147b80 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f40,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f40 L"C:\\windows\\system32\\wordpad.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=0000001f ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\wordpad.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\wordpad.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=436e51cf 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=436e51cf 000d:Call KERNEL32.LZSeek(00000044,00000158,00000000) ret=436e5205 000d:Ret KERNEL32.LZSeek() retval=00000158 ret=436e5205 000d:Call KERNEL32.LZRead(00000044,00147f40,00000078) ret=436e521e 000d:Ret KERNEL32.LZRead() retval=00000078 ret=436e521e 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00026830) ret=436e52ac 000d:Ret ntdll.RtlAllocateHeap() retval=00175118 ret=436e52ac 000d:Call KERNEL32.LZSeek(00000044,00000600,00000000) ret=436e52da 000d:Ret KERNEL32.LZSeek() retval=00000600 ret=436e52da 000d:Call KERNEL32.LZRead(00000044,00175118,00026830) ret=436e52f3 000d:Ret KERNEL32.LZRead() retval=00026830 ret=436e52f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00175118) ret=436e5323 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5323 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=436e5349 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=436e5349 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\wordpad.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f65c ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\wordpad") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140378 L"wordpad",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b80 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00140378 L"wordpad",ffffffff,00147b80,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".wri",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".wri",00000000,00000002,00000000,00147b98,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"wrifile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f70 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"wrifile",ffffffff,00147f70,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".wri",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000042) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f88 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".wri",401cb888 L"MimeType",00000002,00000000,00147f88,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f88 L"application/x-wine-extension-wri",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000021 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000021) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f88 L"application/x-wine-extension-wri",ffffffff,00147f28,00000021,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000021 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f88) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147f28 "application/x-wine-extension-wri",00147b50 "application/x-wine-extension-wri") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".wri",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".wri",401cb8aa L"ProgID",00000002,00000000,00147f28,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".wri",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".wri",401cb878 L"AppName",00000002,00000000,00147f28,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"wordpad",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f40 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"wordpad",ffffffff,00147f40,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147f40 "wordpad",00147b80 "wordpad") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f40) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".wri",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=401c19ab 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140378) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b80) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f70) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000002a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".xbm",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".xbm",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xbm",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xbm",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xbm",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000020) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b88,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000020) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011\6f69\2f6e\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b98 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xbm",00000000,00020019,00147ba0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147ba4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000020) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xbm",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000002b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".xml",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".xml",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xml",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"xmlfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"xmlfile",00000000,00000002,00000000,00147b88,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b98 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xml",00000000,00020019,00147ba0) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147ba4) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b78,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"xmlfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426713d0 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=42671567 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42671567 000d:Call advapi32.RegGetValueW(80000000,00147b78 L"xmlfile",00000000,00000002,00000000,00140328,0033f880) ret=426715ac 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426715ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4267160c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267160c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"XML Document",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000d ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000d) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b78 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147b50 L"XML Document",ffffffff,00147b78,0000000d,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000d ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xml",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b90,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b90 L"xmlfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426712e4 000d:Call advapi32.RegGetValueW(00000044,426e8c00 L"DefaultIcon",00000000,00000002,00000000,00000000,0033f884) ret=42671663 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=42671663 000d:Call advapi32.RegCloseKey(00000044) ret=4267168a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267168a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xml",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b90,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b90 L"\00a8\0011\0098\0011/xml",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140348 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140348 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xml",00000000,00020019,00140350) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140354) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140348) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140360 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140360 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xml",00000000,00020019,00140368) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014036c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00140340,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140340 L"xmlfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140360) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00140340 L"\00d8\0011\00c8\0011ile",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f48 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xml",00000000,00020019,00147f50) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f54) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f28,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f28 L"xmlfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f584) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(00000048,401cb838 L"open",00000000,00020019,0033f580) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f58c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f60,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f48 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xml",00000000,00020019,00147f50) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f54) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f28,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f28 L"xmlfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147f28,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147f28 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f60,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f60 L"C:\\windows\\system32\\winebrowser.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=00000023 ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\winebrowser.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f664 ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\winebrowser") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147f28 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000004,0013fb20,00000000,00147f28 L"\7bd8\0014\00f8\0011",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f68 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147f68 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xml",00000000,00020019,00147f70) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147f74) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147f48,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147f48 L"xmlfile",00000000,00020019,0033f528) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cd2 L"shell",00000000,00020019,0033f524) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000044) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegQueryInfoKeyW(00000048,00000000,00000000,00000000,00000000,0033f514,00000000,00000000,00000000,00000000,00000000,00000000) ret=42670807 000d:Ret advapi32.RegQueryInfoKeyW() retval=00000000 ret=42670807 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000a) ret=42670837 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=42670837 000d:Call advapi32.RegEnumKeyExW(00000048,00000000,00147f48,0033f514,00000000,00000000,00000000,00000000) ret=4267087c 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=4267087c 000d:Call advapi32.RegOpenKeyExW(00000048,00147f48 L"open",00000000,00020019,0033f520) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(00000048) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cde L"command",00000000,00020019,0033f52c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000044) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00000000,0033f4ac) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147f80 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000048,00000000,00000000,00000000,00147f80,0033f4ac) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(00000048) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call KERNEL32.SearchPathW(00000000,00147f80 L"C:\\windows\\system32\\winebrowser.exe",00000000,00000104,0033f626,00000000) ret=42670a38 000d:Ret KERNEL32.SearchPathW() retval=00000023 ret=42670a38 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f80) ret=42670998 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670998 000d:Call version.GetFileVersionInfoSizeW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f880) ret=426711dd 000d:Call KERNEL32.LZOpenFileW(0033f626 L"C:\\windows\\system32\\winebrowser.exe",0033f454,00000000) ret=436e21da 000d:Ret KERNEL32.LZOpenFileW() retval=00000044 ret=436e21da 000d:Call KERNEL32.LZSeek(00000044,00000000,00000000) ret=436e4e13 000d:Ret KERNEL32.LZSeek() retval=00000000 ret=436e4e13 000d:Call KERNEL32.LZRead(00000044,0033f3ac,00000040) ret=436e4e33 000d:Ret KERNEL32.LZRead() retval=00000040 ret=436e4e33 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4ecc 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4ecc 000d:Call KERNEL32.LZRead(00000044,0033f3ed,00000002) ret=436e4ee6 000d:Ret KERNEL32.LZRead() retval=00000002 ret=436e4ee6 000d:Call KERNEL32.LZSeek(00000044,00000060,00000000) ret=436e4f09 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e4f09 000d:Call KERNEL32.LZSeek(00000044,00000000,00000001) ret=436e5022 000d:Ret KERNEL32.LZSeek() retval=00000060 ret=436e5022 000d:Call KERNEL32.LZRead(00000044,0033f2a0,00000108) ret=436e5045 000d:Ret KERNEL32.LZRead() retval=00000108 ret=436e5045 000d:Call KERNEL32.LZClose(00000044) ret=436e2218 000d:Ret KERNEL32.LZClose() retval=00000000 ret=436e2218 000d:Ret version.GetFileVersionInfoSizeW() retval=00000000 ret=426711dd 000d:Call shlwapi.PathRemoveExtensionW(0033f626 L"C:\\windows\\system32\\winebrowser.exe") ret=42671202 000d:Ret shlwapi.PathRemoveExtensionW() retval=0033f664 ret=42671202 000d:Call shlwapi.PathStripPathW(0033f626 L"C:\\windows\\system32\\winebrowser") ret=42671213 000d:Ret shlwapi.PathStripPathW() retval=0033f626 ret=42671213 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f68) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"winebrowser",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f48 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f28 L"winebrowser",ffffffff,00147f48,0000000c,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c06e4 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".xml",00000000,00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f60 ret=401c19f0 000d:Call advapi32.RegGetValueW(80000000,0013fb20 L".xml",00000000,00000002,00000000,00147f60,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=401c0752 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=401c0752 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f78 L"xmlfile",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147fc0 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f78 L"xmlfile",ffffffff,00147fc0,00000008,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000008 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=401c09f1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c09f1 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fa4c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".xml",401cb888 L"MimeType",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".xml",401cb888 L"MimeType",00000002,00000000,00147f78,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f78 L"text/xml",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f98 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f78 L"text/xml",ffffffff,00147f98,00000009,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000009 ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147f98 "text/xml",00140328 "text/xml") ret=401c7906 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c7906 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f98) ret=401c7938 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7938 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".xml",401cb8aa L"ProgID",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".xml",401cb8aa L"ProgID",00000002,00000000,00147f78,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=401c79b3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c79b3 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".xml",401cb878 L"AppName",00000002,00000000,00000000,0033fa1c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".xml",401cb878 L"AppName",00000002,00000000,00147f78,0033fa1c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f78 L"winebrowser",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147f98 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,00147f78 L"winebrowser",ffffffff,00147f98,0000000c,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000000c ret=401c06e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=401c1a9b 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c1a9b 000d:Call KERNEL32.lstrcmpA(00147f98 "winebrowser",00147f48 "winebrowser") ret=401c79dc 000d:Ret KERNEL32.lstrcmpA() retval=00000000 ret=401c79dc 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f98) ret=401c7a0a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7a0a 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".xml",401cb89a L"DocName",00000002,00000000,00000000,0033fa3c) ret=401c19ab 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c19ab 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001a) ret=401c19f0 000d:Ret ntdll.RtlAllocateHeap() retval=00147f78 ret=401c19f0 000d:Call advapi32.RegGetValueW(00000040,0013fb20 L".xml",401cb89a L"DocName",00000002,00000000,00147f78,0033fa3c) ret=401c1a27 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=401c1a27 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f78) ret=401c7aa1 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7aa1 000d:Call advapi32.RegCloseKey(00000040) ret=401c7aaf 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c7aaf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b78) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f28) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f48) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147f60) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147fc0) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000002c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".xsl",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".xsl",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xsl",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegGetValueW(80000000,00147b50 L"xslfile",00000000,00000002,00000000,00000000,0033f880) ret=426713d0 000d:Ret advapi32.RegGetValueW() retval=00000002 ret=426713d0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xsl",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b50,0033f58c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b50 L"xslfile",00000000,00020019,0033f880) ret=426712e4 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=426712e4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xsl",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b50,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011/xml",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b90 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b90 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xsl",00000000,00020019,00147b98) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b9c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00147b70,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b90) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000009) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".xsl",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b88 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00147b88,0033f50c) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00147b88 L"xslfile",00000000,00020019,0033f588) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b88) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000002d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".zip",ffffffff,00000000,00000000,00000000,00000000) ret=401c0681 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c0681 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000005) ret=401c06a3 000d:Ret ntdll.RtlAllocateHeap() retval=00147d10 ret=401c06a3 000d:Call KERNEL32.WideCharToMultiByte(0000fde9,00000000,0013fb20 L".zip",ffffffff,00147d10,00000005,00000000,00000000) ret=401c06e4 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000005 ret=401c06e4 000d:Call shlwapi.AssocQueryStringW(00000000,00000003,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".zip",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000f,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".zip",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f58c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00147b70 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00147b70 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".zip",00000000,00020019,00147b78) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00147b7c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140328,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b70) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,0000000e,0013fb20,00000000,00147b50 L"\00d8\0011\00c8\0011/x\0230\4267",0033fa3c) ret=401c1924 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140328 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".zip",00000000,00020019,00140330) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,00140334) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00000000,0033f888) ret=42671168 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=42671168 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000003a) ret=426714a0 000d:Ret ntdll.RtlAllocateHeap() retval=00140340 ret=426714a0 000d:Call advapi32.RegGetValueW(00000040,00000000,426e8c18 L"Content Type",00000002,00000000,00140340,0033f888) ret=426714f3 000d:Ret advapi32.RegGetValueW() retval=00000000 ret=426714f3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140340) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000001d) ret=401c03bb 000d:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=401c03bb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013fb20,401cb838,00000000,0033fa3c) ret=401c18ca 000d:Call shell32.102(00000000,0033f8c0,00000000,405cf4d8,0033f91c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00147b98 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00140350 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00140350 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b98) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013fb20 L".zip",00000000,00020019,00140358) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000040,426e8cee L"ProgID",00000000,00020019,0014035c) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000040,00000000,00000000,00000000,00000000,0033f50c) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426704b3 000d:Call advapi32.RegCloseKey(00000040) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140350) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=80070002 ret=401c18ca 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147d10) ret=401c7d11 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d11 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d34 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d34 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d57 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d7a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d7a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7d9d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7d9d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7dc0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7dc0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=401c7de3 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7de3 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=401c7e07 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e07 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e2a 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e2a 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e4d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e4d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e70 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e70 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7e93 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7e93 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000002e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000002f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000030,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000031,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000032,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000033,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000034,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000035,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000036,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000037,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000038,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000039,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000003a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000003b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000003c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000003d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000003e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000003f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000040,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000041,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000042,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000043,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000044,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000045,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000046,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000047,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000048,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000049,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000004a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000004b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000004c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000004d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000004e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000004f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000050,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000051,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000052,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000053,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000054,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000055,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000056,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000057,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000058,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000059,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000005a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000005b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000005c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000005d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000005e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000005f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000060,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000061,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000062,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000063,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000064,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000065,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000066,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000067,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000068,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000069,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000006a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000006b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000006c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000006d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000006e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000006f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000070,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000071,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000072,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000073,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000074,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000075,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000076,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000077,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000078,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000079,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000007a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000007b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000007c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000007d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000007e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000007f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000080,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000081,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000082,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000083,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000084,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000085,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000086,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000087,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000088,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000089,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000008a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000008b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000008c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000008d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000008e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000008f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000090,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000091,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000092,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000093,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000094,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000095,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000096,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000097,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000098,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000099,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000009a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000009b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000009c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000009d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000009e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000009f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000a0,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000a1,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000a2,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000a3,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000a4,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000a5,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000a6,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000a7,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000a8,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000a9,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000aa,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ab,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ac,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ad,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ae,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000af,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000b0,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000b1,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000b2,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000b3,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000b4,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000b5,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000b6,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000b7,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000b8,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000b9,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ba,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000bb,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000bc,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000bd,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000be,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000bf,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000c0,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000c1,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000c2,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000c3,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000c4,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000c5,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000c6,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000c7,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000c8,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000c9,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ca,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000cb,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000cc,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000cd,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ce,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000cf,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000d0,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000d1,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000d2,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000d3,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000d4,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000d5,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000d6,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000d7,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000d8,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000d9,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000da,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000db,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000dc,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000dd,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000de,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000df,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000e0,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000e1,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000e2,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000e3,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000e4,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000e5,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000e6,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000e7,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000e8,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000e9,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ea,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000eb,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ec,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ed,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ee,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ef,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000f0,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000f1,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000f2,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000f3,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000f4,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000f5,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000f6,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000f7,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000f8,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000f9,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000fa,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000fb,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000fc,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000fd,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000fe,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,000000ff,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000100,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000101,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000102,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000103,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000104,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000105,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000106,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000107,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000108,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000109,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000010a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000010b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000010c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000010d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000010e,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000010f,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000110,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000111,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000112,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000113,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000114,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000115,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000116,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000117,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000118,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,00000119,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000011a,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000011b,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000011c,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c7550 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7550 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c7576 000d:Ret ntdll.RtlAllocateHeap() retval=0013fb20 ret=401c7576 000d:Call advapi32.RegEnumKeyExW(80000000,0000011d,0013fb20,0033fb2c,00000000,00000000,00000000,00000000) ret=401c75c5 000d:Ret advapi32.RegEnumKeyExW() retval=00000103 ret=401c75c5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb20) ret=401c7610 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c7610 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145118) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140420) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140408) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464f8) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464e0) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464c8) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145918) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001458e8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00146510) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145960) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145948) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145930) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145990) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145978) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001451a0) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145178) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145160) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001451d0) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001451b8) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001404b0) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140490) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140478) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001404f8) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001404e0) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001404c8) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147810) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140528) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140510) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147870) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147840) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147828) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001478b8) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001478a0) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147888) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147910) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001478e8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001478d0) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147960) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147940) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147928) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147990) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001452b8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147978) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145310) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001452f8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001452e0) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145358) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145340) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145328) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001453b8) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145388) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145370) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3c0) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001453d0) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f408) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3f0) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3d8) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f460) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f438) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f420) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f4a8) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f490) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f478) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f4f8) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f4d8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f4c0) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f540) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f528) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f510) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f588) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f570) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f558) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f5d0) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f5b8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f5a0) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f630) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f600) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f5e8) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f678) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f660) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f648) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f6c0) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f6a8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f690) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f720) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f6f0) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f6d8) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f780) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f750) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f738) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f7c8) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f7b0) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f798) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f810) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f7f8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f7e0) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f858) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f840) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f828) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f8a0) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f888) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f870) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f8e8) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f8d0) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f8b8) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f948) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f918) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f900) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f998) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f978) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f960) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f9e8) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f9c8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f9b0) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fa30) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fa18) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fa00) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fa78) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fa60) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fa48) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fac0) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013faa8) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fa90) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fb08) ret=401c02f0 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c02f0 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013faf0) ret=401c0313 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0313 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013fad8) ret=401c0333 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0333 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=401c0366 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c0366 000d:Call advapi32.RegCreateKeyW(80000001,401cb8c0 L"Software\\Wine\\FileOpenAssociations",0033fb3c) ret=401c1ada 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1ada 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,00000000,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".chm",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"chm.file",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002a) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001403d8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002a) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001403d8 L"\7b50\0014\00c8\0011indows\\hh.exe %1",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".chm",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"chm.file",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002a) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140410 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00140410,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140410) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,00000001,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".gif",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"giffile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001464b0,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001464b0 L"\00e8\0011\00d8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".gif",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"giffile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00140460,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,00000002,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".hlp",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"hlpfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000048) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001403d8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000b:Ret PE DLL (proc=0x42a17de0,module=0x429c0000 L"gdi32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000b:Call PE DLL (proc=0x4290f0c0,module=0x42870000 L"user32.dll",reason=PROCESS_ATTACH,res=0x0) 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000048) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001403d8 L"\7b50\0014\00c8\0011indows\\system32\\winhlp32.exe %1",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140428 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140428) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".hlp",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140428 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00140428,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140428 L"hlpfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140428) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000048) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00147b50,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,00000003,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".htm",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"htmlfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001403d8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001403d8 L"\7b50\0014\00c8\0011indows\\system32\\winebrowser.exe -nohome",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".htm",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"htmlfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00147b50,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000b:Call PE DLL (proc=0x4332ebb0,module=0x43320000 L"imm32.dll",reason=PROCESS_ATTACH,res=0x0) 000b:Call user32.RegisterWindowMessageA(4332f250 "MSIMEService") ret=43329a8e 000d:Call advapi32.RegEnumKeyExW(00000040,00000004,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000b:Ret user32.RegisterWindowMessageA() retval=0000c000 ret=43329a8e 000b:Call user32.RegisterWindowMessageA(4332f25d "MSIMEReconvertOptions") ret=43329aa5 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000b:Ret user32.RegisterWindowMessageA() retval=0000c001 ret=43329aa5 000b:Call user32.RegisterWindowMessageA(4332f273 "MSIMEMouseOperation") ret=43329abc 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000b:Ret user32.RegisterWindowMessageA() retval=0000c002 ret=43329abc 000b:Call user32.RegisterWindowMessageA(4332f287 "MSIMEReconvertRequest") ret=43329ad3 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000b:Ret user32.RegisterWindowMessageA() retval=0000c003 ret=43329ad3 000b:Call user32.RegisterWindowMessageA(4332f29d "MSIMEReconvert") ret=43329aea 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000b:Ret user32.RegisterWindowMessageA() retval=0000c004 ret=43329aea 000b:Call user32.RegisterWindowMessageA(4332f2ac "MSIMEQueryPosition") ret=43329b01 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000b:Ret user32.RegisterWindowMessageA() retval=0000c005 ret=43329b01 000b:Call user32.RegisterWindowMessageA(4332f2bf "MSIMEDocumentFeed") ret=43329b18 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000b:Ret user32.RegisterWindowMessageA() retval=0000c006 ret=43329b18 000b:Call KERNEL32.TlsAlloc() ret=43329b26 000b:Ret KERNEL32.TlsAlloc() retval=00000000 ret=43329b26 000b:Ret PE DLL (proc=0x4332ebb0,module=0x43320000 L"imm32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000b:Call PE DLL (proc=0x4316a1e0,module=0x43100000 L"winex11.drv",reason=PROCESS_ATTACH,res=0x0) 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".html",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"htmlfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001403d8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001403d8 L"\7b50\0014\00c8\0011indows\\system32\\winebrowser.exe -nohome",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".html",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"htmlfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00147b50,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,00000005,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".ini",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"inifile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001403d8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001403d8 L"\7b50\0014\00c8\0011indows\\system32\\notepad.exe %1",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140428 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140428) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".ini",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140428 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00140428,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140428 L"inifile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140428) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00147b50,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,00000006,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".jfif",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"pjpegfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001464b0,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001464b0 L"\00e8\0011\00d8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".jfif",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"pjpegfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00140460,0033f5fc) ret=4267053a 000b:Ret PE DLL (proc=0x4316a1e0,module=0x43100000 L"winex11.drv",reason=PROCESS_ATTACH,res=0x0) retval=1 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,00000007,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".jpe",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"jpegfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001464b0,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001464b0 L"\00e8\0011\00d8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".jpe",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"jpegfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00140460,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,00000008,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".jpeg",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"jpegfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001464b0,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001464b0 L"\00e8\0011\00d8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".jpeg",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"jpegfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00140460,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,00000009,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".jpg",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"jpegfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001464b0,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001464b0 L"\00e8\0011\00d8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".jpg",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000012) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"jpegfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00140460,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,0000000a,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".png",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"pngfile",00000000,00020019,0033f678) ret=42670606 000b:Ret PE DLL (proc=0x4290f0c0,module=0x42870000 L"user32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000b:Call PE DLL (proc=0x407c6b50,module=0x40790000 L"shlwapi.dll",reason=PROCESS_ATTACH,res=0x0) 000b:Call KERNEL32.DisableThreadLibraryCalls(40790000) ret=407b884b 000b:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=407b884b 000b:Call KERNEL32.TlsAlloc() ret=407b8859 000b:Ret KERNEL32.TlsAlloc() retval=00000002 ret=407b8859 000b:Ret PE DLL (proc=0x407c6b50,module=0x40790000 L"shlwapi.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000b:Call PE DLL (proc=0x42af8af0,module=0x42a60000 L"comctl32.dll",reason=PROCESS_ATTACH,res=0x0) 000b:Call KERNEL32.DisableThreadLibraryCalls(42a60000) ret=42a705db 000b:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=42a705db 000b:Call KERNEL32.GlobalAddAtomW(42b064c0 L"CC32SubclassInfo") ret=42a705f2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000b:Ret KERNEL32.GlobalAddAtomW() retval=0000c015 ret=42a705f2 000b:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42b064e2) ret=42a70639 000b:Ret gdi32.CreateBitmap() retval=00000204 ret=42a70639 000b:Call gdi32.CreatePatternBrush(00000204) ret=42a7064a 000b:Ret gdi32.CreatePatternBrush() retval=0000020c ret=42a7064a 000b:Call user32.GetSysColor(00000014) ret=42a6e53a 000b:Ret user32.GetSysColor() retval=00ffffff ret=42a6e53a 000b:Call user32.GetSysColor(00000010) ret=42a6e551 000b:Ret user32.GetSysColor() retval=00808080 ret=42a6e551 000b:Call user32.GetSysColor(00000012) ret=42a6e563 000b:Ret user32.GetSysColor() retval=00000000 ret=42a6e563 000b:Call user32.GetSysColor(0000000f) ret=42a6e575 000b:Ret user32.GetSysColor() retval=00c8d0d4 ret=42a6e575 000b:Call user32.GetSysColor(0000000d) ret=42a6e587 000b:Ret user32.GetSysColor() retval=006a240a ret=42a6e587 000b:Call user32.GetSysColor(0000000e) ret=42a6e599 000b:Ret user32.GetSysColor() retval=00ffffff ret=42a6e599 000b:Call user32.GetSysColor(0000001a) ret=42a6e5ab 000b:Ret user32.GetSysColor() retval=00800000 ret=42a6e5ab 000b:Call user32.GetSysColor(00000014) ret=42a6e5bd 000b:Ret user32.GetSysColor() retval=00ffffff ret=42a6e5bd 000b:Call user32.GetSysColor(00000010) ret=42a6e5cf 000b:Ret user32.GetSysColor() retval=00808080 ret=42a6e5cf 000b:Call user32.GetSysColor(00000015) ret=42a6e5e1 000b:Ret user32.GetSysColor() retval=00404040 ret=42a6e5e1 000b:Call user32.GetSysColor(0000000f) ret=42a6e5f3 000b:Ret user32.GetSysColor() retval=00c8d0d4 ret=42a6e5f3 000b:Call user32.GetSysColor(00000005) ret=42a6e605 000b:Ret user32.GetSysColor() retval=00ffffff ret=42a6e605 000b:Call user32.GetSysColor(00000008) ret=42a6e617 000b:Ret user32.GetSysColor() retval=00000000 ret=42a6e617 000b:Call user32.GetSysColor(00000011) ret=42a6e629 000b:Ret user32.GetSysColor() retval=00808080 ret=42a6e629 000b:Call user32.GetSysColor(00000002) ret=42a6e63b 000b:Ret user32.GetSysColor() retval=006a240a ret=42a6e63b 000b:Call user32.GetSysColor(00000018) ret=42a6e64d 000b:Ret user32.GetSysColor() retval=00e1ffff ret=42a6e64d 000b:Call user32.GetSysColor(00000017) ret=42a6e65f 000b:Ret user32.GetSysColor() retval=00000000 ret=42a6e65f 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42a63126 000b:Ret user32.LoadCursorW() retval=0005002e ret=42a63126 000b:Call user32.RegisterClassW(0033e54c) ret=42a6318f 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000b:Ret user32.RegisterClassW() retval=0000c016 ret=42a6318f 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42a65d46 000b:Ret user32.LoadCursorW() retval=0005002e ret=42a65d46 000b:Call user32.RegisterClassW(0033e54c) ret=42a65daf 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 6 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 70d36 000b:Call user32.RegisterClassW(0033e544) ret=42a70dbd 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000b:Ret user32.RegisterClassW() retval=0000c018 ret=42a70dbd 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42a78096 000b:Ret user32.LoadCursorW() retval=0005002e ret=42a78096 000b:Call user32.RegisterClassW(0033e548) ret=42a7810b 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000b:Ret user32.RegisterClassW() retval=0000c019 ret=42a7810b 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42a78876 000b:Ret user32.LoadCursorW() retval=0005002e ret=42a78876 000b:Call user32.RegisterClassW(0033e550) ret=42a788d2 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000b:Ret user32.RegisterClassW() retval=0000c01a ret=42a788d2 000b:Call user32.RegisterClassW(0033e558) ret=42a7d287 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000076) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001464b0,0033f5fc) ret=4267053a 000b:Ret user32.RegisterClassW() retval=0000c01b ret=42a7d287 000b:Call user32.LoadCursorW(00000000,00007f01) ret=42a86d66 000b:Ret user32.LoadCursorW() retval=00010030 ret=42a86d66 000b:Call user32.RegisterClassW(0033e548) ret=42a86ddb 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000b:Ret user32.RegisterClassW() retval=0000c01c ret=42a86ddb 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42a88946 000b:Ret user32.LoadCursorW() retval=0005002e ret=42a88946 000b:Call user32.RegisterClassW(0033e54c) ret=42a889b5 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000b:Ret user32.RegisterClassW() retval=0000c01d ret=42a889b5 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42aa3e36 000b:Ret user32.LoadCursorW() retval=0005002e ret=42aa3e36 000b:Call user32.RegisterClassW(0033e54c) ret=42aa3ea5 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000076) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001464b0 L"\00e8\0011\00d8\0011Program Files\\Internet Explorer\\iexplore.exe\" -nohome\r",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".png",00000000,00020019,00145080) ret=42670c69 000b:Ret user32.RegisterClassW() retval=0000c01e ret=42aa3ea5 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42aaa6a6 000b:Ret user32.LoadCursorW() retval=0005002e ret=42aaa6a6 000b:Call user32.RegisterClassW(0033e54c) ret=42aaa715 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000b:Ret user32.RegisterClassW() retval=0000c01f ret=42aaa715 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42aaaa26 000b:Ret user32.LoadCursorW() retval=0005002e ret=42aaaa26 000b:Call user32.RegisterClassW(0033e554) ret=42aaaa77 42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000b:Ret user32.RegisterClassW() retval=0000c020 ret=42aaaa77 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42aadad6 1 000b:Ret user32.LoadCursorW() retval=0005002e ret=42aadad6 00,00000000,001465e8,0033f5fc) ret=4267053a 000b:Call user32.RegisterClassW(0033e544) ret=42aadb56 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000b:Ret user32.RegisterClassW() retval=0000c021 ret=42aadb56 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"pngfile",00000000,00020019,0033f678) ret=42670606 000b:Call user32.RegisterClassW(0033e55c) ret=42ab702b 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000b:Call user32.GetSystemMetrics(00000044) ret=42ab703a 000b:Ret user32.GetSystemMetrics() retval=00000004 ret=42ab703a 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000b:Call user32.GetSystemMetrics(00000045) ret=42ab704f 000b:Ret user32.GetSystemMetrics() retval=00000004 ret=42ab704f 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42ac02f0 000b:Ret user32.LoadCursorW() retval=0005002e ret=42ac02f0 000b:Call user32.RegisterClassW(0033e540) ret=42ac037d 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000b:Ret user32.RegisterClassW() retval=0000c023 ret=42ac037d 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42ac5796 000b:Ret user32.LoadCursorW() retval=0005002e ret=42ac5796 000b:Call user32.RegisterClassW(0033e558) ret=42ac57da 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000b:Ret user32.RegisterClassW() retval=0000c024 ret=42ac57da 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42ac8336 000b:Ret user32.LoadCursorW() retval=0005002e ret=42ac8336 000b:Call user32.RegisterClassW(0033e548) ret=42ac83b1 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000b:Ret user32.RegisterClassW() retval=0000c025 ret=42ac83b1 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42ad24e6 000b:Ret user32.LoadCursorW() retval=0005002e ret=42ad24e6 000b:Call user32.RegisterClassW(0033e548) ret=42ad2561 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000b:Ret user32.RegisterClassW() retval=0000c026 ret=42ad2561 000b:Call user32.LoadCursorW(00000000,00007f00) ret=42ae1a50 000b:Ret user32.LoadCursorW() retval=0005002e ret=42ae1a50 000b:Call user32.RegisterClassW(0033e544) ret=42ae1ad1 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000b:Ret user32.RegisterClassW() retval=0000c027 ret=42ae1ad1 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000076) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00140460,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,0000000b,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".rtf",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000b:Call user32.LoadImageW(42a60000,00000019,00000001,00000000,00000000,00000000) ret=42ae1b54 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"rtffile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000b:Ret user32.LoadImageW() retval=00010034 ret=42ae1b54 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=42670501 ,00000000,00000000) ret=42ae1b8c 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001403d8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001403d8 L"\7b50\0014\00c8\0011indows\\system32\\wordpad.exe %1",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140428 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140428) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".rtf",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000b:Ret user32.LoadImageW() retval=00010036 ret=42ae1b8c 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140428 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00140428,0033f5fc) ret=4267053a 000b:Ret user32.RegisterClassW() retval=0000c028 ret=42ae6bcd 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140428 L"rtffile",00000000,00020019,0033f678) ret=42670606 000b:Ret user32.LoadCursorW() retval=0005002e ret=42aeaea3 000b:Call user32.RegisterClassW(0033e54c) ret=42aeaf12 000b:Ret user32.RegisterClassW() retval=0000c029 ret=42aeaf12 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140428) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000b:Call user32.RegisterClassW(0033e548) ret=42af6501 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000b:Ret user32.RegisterClassW() retval=0000c02a ret=42af6501 000b:Call KERNEL32.LoadLibraryA(42b0e156 "uxtheme.dll") ret=42af8aab 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000b:Call PE DLL (proc=0x43382540,module=0x43370000 L"uxtheme.dll",reason=PROCESS_ATTACH,res=0x0) 000b:Call KERNEL32.DisableThreadLibraryCalls(43370000) ret=4337a9de 000b:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=4337a9de 000b:Call KERNEL32.GlobalAddAtomW(43390f8a L"ux_theme") ret=433806c8 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000b:Ret KERNEL32.GlobalAddAtomW() retval=0000c02b ret=433806c8 000b:Call KERNEL32.GlobalAddAtomW(43390f76 L"ux_subapp") ret=433806e0 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00147b50,0033f5fc) ret=4267053a 000b:Ret KERNEL32.GlobalAddAtomW() retval=0000c02c ret=433806e0 000b:Call KERNEL32.GlobalAddAtomW(43390f5e L"ux_subidlst") ret=433806f8 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000b:Ret KERNEL32.GlobalAddAtomW() retval=0000c02d ret=433806f8 000b:Call KERNEL32.GlobalAddAtomW(43390f40 L"ux_dialogtheme") ret=43380710 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000b:Ret KERNEL32.GlobalAddAtomW() retval=0000c02e ret=43380710 000b:Call advapi32.RegOpenKeyW(80000001,43390dc0 L"Software\\Microsoft\\Windows\\CurrentVersion\\ThemeManager",0033de48) ret=43380739 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000b:Ret advapi32.RegOpenKeyW() retval=00000002 ret=43380739 000b:Ret PE DLL (proc=0x43382540,module=0x43370000 L"uxtheme.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000b:Ret KERNEL32.LoadLibraryA() retval=43370000 ret=42af8aab 000b:Call KERNEL32.GetProcAddress(43370000,42b0e282 "IsThemeActive") ret=42af8a7c 000b:Ret KERNEL32.GetProcAddress() retval=43372aa8 ret=42af8a7c 000b:Call uxtheme.IsThemeActive() ret=42ad2087 000b:Ret uxtheme.IsThemeActive() retval=00000000 ret=42ad2087 000b:Ret PE DLL (proc=0x42af8af0,module=0x42a60000 L"comctl32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000b:Call PE DLL (proc=0x426d9ab0,module=0x42660000 L"shell32.dll",reason=PROCESS_ATTACH,res=0x0) 000b:Call KERNEL32.DisableThreadLibraryCalls(42660000) ret=426900d1 000b:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=426900d1 000b:Call KERNEL32.GetModuleFileNameW(42660000,4282d1e0,00000104) ret=426900ee 000b:Ret KERNEL32.GetModuleFileNameW() retval=0000001f ret=426900ee 000b:Call comctl32.InitCommonControlsEx(00000000) ret=42690106 000b:Ret comctl32.InitCommonControlsEx() retval=00000000 ret=42690106 000b:Call user32.GetSystemMetrics(00000031) ret=42686451 000b:Ret user32.GetSystemMetrics() retval=00000010 ret=42686451 000b:Call user32.GetSystemMetrics(00000032) ret=42686462 000b:Ret user32.GetSystemMetrics() retval=00000010 ret=42686462 000b:Call user32.GetSystemMetrics(0000000b) ret=42686473 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,0000000c,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".txt",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"txtfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001403d8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001403d8 L"\7b50\0014\00c8\0011indows\\system32\\notepad.exe %1",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140428 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140428) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".txt",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140428 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00140428,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140428 L"txtfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140428) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000b:Ret user32.GetSystemMetrics() retval=00000020 ret=42686473 000b:Call user32.GetSystemMetrics(0000000c) ret=42686485 000b:Ret user32.GetSystemMetrics() retval=00000020 ret=42686485 000b:Call comctl32.328(00000010) ret=4268650c 000b:Call KERNEL32.LocalAlloc(00000040,00000014) ret=42a6c623 000b:Ret KERNEL32.LocalAlloc() retval=0013d090 ret=42a6c623 000b:Call ntdll.RtlAllocateHeap(00110000,00000008,00000080) ret=42a75848 000b:Ret ntdll.RtlAllocateHeap() retval=0013d220 ret=42a75848 000b:Ret comctl32.328() retval=0013d090 ret=4268650c 000b:Call comctl32.ImageList_Create(00000010,00000010,00000021,00000000,00000020) ret=42686541 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008c) ret=42a8463a 000b:Ret ntdll.RtlAllocateHeap() retval=0013d2a8 ret=42a8463a 000b:Call gdi32.CreateCompatibleDC(00000000) ret=42a847a0 000b:Ret gdi32.CreateCompatibleDC() retval=00000298 ret=42a847a0 000b:Call gdi32.CreateCompatibleDC(00000000) ret=42a84974 000b:Ret gdi32.CreateCompatibleDC() retval=000002a4 ret=42a84974 000b:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42a6c623 000b:Ret KERNEL32.LocalAlloc() retval=0013d890 ret=42a6c623 000b:Call gdi32.CreateDIBSection(00000298,0013d890,00000000,0033e47c,00000000,00000000) ret=42a7f5b7 000b:Ret gdi32.CreateDIBSection() retval=000002b0 ret=42a7f5b7 000b:Call KERNEL32.LocalFree(0013d890) ret=42a6c36b 000b:Ret KERNEL32.LocalFree() retval=00000000 ret=42a6c36b 000b:Call gdi32.SelectObject(00000298,000002b0) ret=42a8480f 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a8480f 000b:Call gdi32.CreateBitmap(00000040,00000010,00000001,00000001,00000000) ret=42a84a0c 000b:Ret gdi32.CreateBitmap() retval=000002b4 ret=42a84a0c 000b:Call gdi32.SelectObject(000002a4,000002b4) ret=42a84a2b 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a84a2b 000b:Call ntdll.RtlAllocateHeap(00110000,00000008,00000001) ret=42a84a5b 000b:Ret ntdll.RtlAllocateHeap() retval=0013d890 ret=42a84a5b 000b:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42b065da) ret=42a84871 000b:Ret gdi32.CreateBitmap() retval=000002b8 ret=42a84871 000b:Call gdi32.CreatePatternBrush(000002b8) ret=42a84881 000b:Ret gdi32.CreatePatternBrush() retval=000002c0 ret=42a84881 000b:Call gdi32.DeleteObject(000002b8) ret=42a8488f 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a8488f 000b:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42b065ca) ret=42a848c0 000b:Ret gdi32.CreateBitmap() retval=000002c4 ret=42a848c0 000b:Call gdi32.CreatePatternBrush(000002c4) ret=42a848d0 000b:Ret gdi32.CreatePatternBrush() retval=000002cc ret=42a848d0 000b:Call gdi32.DeleteObject(000002c4) ret=42a848de 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a848de 000b:Ret comctl32.ImageList_Create() retval=0013d2a8 ret=42686541 000b:Call comctl32.ImageList_Create(00000020,00000020,00000021,00000000,00000020) ret=42686576 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008c) ret=42a8463a 000b:Ret ntdll.RtlAllocateHeap() retval=0013ed08 ret=42a8463a 000b:Call gdi32.CreateCompatibleDC(00000000) ret=42a847a0 000b:Ret gdi32.CreateCompatibleDC() retval=000002d0 ret=42a847a0 000b:Call gdi32.CreateCompatibleDC(00000000) ret=42a84974 000b:Ret gdi32.CreateCompatibleDC() retval=000002dc ret=42a84974 000b:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42a6c623 000b:Ret KERNEL32.LocalAlloc() retval=0013f2f0 ret=42a6c623 000b:Call gdi32.CreateDIBSection(000002d0,0013f2f0,00000000,0033e47c,00000000,00000000) ret=42a7f5b7 000b:Ret gdi32.CreateDIBSection() retval=000002e8 ret=42a7f5b7 000b:Call KERNEL32.LocalFree(0013f2f0) ret=42a6c36b 000b:Ret KERNEL32.LocalFree() retval=00000000 ret=42a6c36b 000b:Call gdi32.SelectObject(000002d0,000002e8) ret=42a8480f 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a8480f 000b:Call gdi32.CreateBitmap(00000080,00000020,00000001,00000001,00000000) ret=42a84a0c 000b:Ret gdi32.CreateBitmap() retval=000002ec ret=42a84a0c 000b:Call gdi32.SelectObject(000002dc,000002ec) ret=42a84a2b 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a84a2b 000b:Call ntdll.RtlAllocateHeap(00110000,00000008,00000001) ret=42a84a5b 000b:Ret ntdll.RtlAllocateHeap() retval=0013f2f0 ret=42a84a5b 000b:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42b065da) ret=42a84871 000b:Ret gdi32.CreateBitmap() retval=000002f0 ret=42a84871 000b:Call gdi32.CreatePatternBrush(000002f0) ret=42a84881 000b:Ret gdi32.CreatePatternBrush() retval=000002f8 ret=42a84881 000b:Call gdi32.DeleteObject(000002f0) ret=42a8488f 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a8488f 000b:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42b065ca) ret=42a848c0 000b:Ret gdi32.CreateBitmap() retval=000002fc ret=42a848c0 000b:Call gdi32.CreatePatternBrush(000002fc) ret=42a848d0 000b:Ret gdi32.CreatePatternBrush() retval=00000304 ret=42a848d0 000b:Call gdi32.DeleteObject(000002fc) ret=42a848de 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a848de 000b:Ret comctl32.ImageList_Create() retval=0013ed08 ret=42686576 000b:Call comctl32.ImageList_SetBkColor(0013d2a8,ffffffff) ret=42686599 000b:Ret comctl32.ImageList_SetBkColor() retval=ffffffff ret=42686599 000b:Call comctl32.ImageList_SetBkColor(0013ed08,ffffffff) ret=426865b4 000b:Ret comctl32.ImageList_SetBkColor() retval=ffffffff ret=426865b4 000b:Call user32.LoadImageA(42660000,00000001,00000001,00000010,00000010,00008000) ret=426865e7 000b:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000b 000b:trace:seh:raise_exception info[0]=00000001 000b:trace:seh:raise_exception info[1]=00360000 000b:trace:seh:raise_exception eax=9999cccc ebx=00000328 ecx=000000ac edx=00000067 esi=00000001 edi=00360000 000b:trace:seh:raise_exception ebp=0033e0c8 esp=0033e040 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010a02 000b:trace:seh:call_vectored_handlers calling handler at 0x4311ac30 code=c0000005 flags=0 000b:trace:seh:call_vectored_handlers handler at 0x4311ac30 returned ffffffff 000b:Ret user32.LoadImageA() retval=00010038 ret=426865e7 000b:Call user32.LoadImageA(42660000,00000001,00000001,00000020,00000020,00008000) ret=4268661c 000b:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000b 000b:trace:seh:raise_exception info[0]=00000001 000b:trace:seh:raise_exception info[1]=00370000 000b:trace:seh:raise_exception eax=00000000 ebx=0000034c ecx=00000000 edx=00000000 esi=00000001 edi=00370000 000b:trace:seh:raise_exception ebp=0033e0c8 esp=0033e040 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010246 000b:trace:seh:call_vectored_handlers calling handler at 0x4311ac30 code=c0000005 flags=0 000b:trace:seh:call_vectored_handlers handler at 0x4311ac30 returned ffffffff 000b:Ret user32.LoadImageA() retval=0001003a ret=4268661c 000b:Call KERNEL32.LoadLibraryA(426f6834 "ole32.dll") ret=426d9a6b 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00147b50,0033f5fc) ret=4267053a 000b:Call PE DLL (proc=0x4366b2f0,module=0x43620000 L"rpcrt4.dll",reason=PROCESS_ATTACH,res=0x0) 000b:Ret PE DLL (proc=0x4366b2f0,module=0x43620000 L"rpcrt4.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000b:Call PE DLL (proc=0x435b9760,module=0x434f0000 L"ole32.dll",reason=PROCESS_ATTACH,res=0x0) 000b:Call user32.RegisterClassW(0033dc68) ret=4350584a 000b:Ret user32.RegisterClassW() retval=0000c02f ret=4350584a 000b:Ret PE DLL (proc=0x435b9760,module=0x434f0000 L"ole32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000b:Ret KERNEL32.LoadLibraryA() retval=434f0000 ret=426d9a6b 000b:Call KERNEL32.GetProcAddress(434f0000,426f68b3 "CoTaskMemAlloc") ret=426d9a3c 000b:Ret KERNEL32.GetProcAddress() retval=434f2dd8 ret=426d9a3c 000b:Call ole32.CoTaskMemAlloc(00000014) ret=4269c0ac 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=43520fa3 000b:Ret ntdll.RtlAllocateHeap() retval=00143750 ret=43520fa3 000b:Ret ole32.CoTaskMemAlloc() retval=00143750 ret=4269c0ac 000b:Call KERNEL32.GetFullPathNameW(4282d1e0 L"C:\\windows\\system32\\shell32.dll",00000104,0033e3a8,00000000) ret=426856e6 000b:Ret KERNEL32.GetFullPathNameW() retval=0000001f ret=426856e6 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000040) ret=4268572e 000b:Ret ntdll.RtlAllocateHeap() retval=00143770 ret=4268572e 000b:Call comctl32.334(0013d090,00007fff,00143750) ret=42685791 000b:Ret comctl32.334() retval=00000000 ret=42685791 000b:Call comctl32.ImageList_ReplaceIcon(0013d2a8,ffffffff,00010038) ret=426857bd 000b:Call user32.CopyImage(00010038,00000001,00000010,00000010,00004000) ret=42a80bfc 000b:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000b 000b:trace:seh:raise_exception info[0]=00000001 000b:trace:seh:raise_exception info[1]=00380000 000b:trace:seh:raise_exception eax=9999cccc ebx=00000370 ecx=000000ac edx=00000067 esi=00000001 edi=00380000 000b:trace:seh:raise_exception ebp=0033ded8 esp=0033de50 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010a02 000b:trace:seh:call_vectored_handlers calling handler at 0x4311ac30 code=c0000005 flags=0 000b:trace:seh:call_vectored_handlers handler at 0x4311ac30 returned ffffffff 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000b:Ret user32.CopyImage() retval=0001003c ret=42a80bfc 000b:Call user32.GetIconInfo(0001003c,0033e27c) ret=42a80c27 000b:Ret user32.GetIconInfo() retval=00000001 ret=42a80c27 000b:Call gdi32.GetObjectW(000003a8,00000018,0033e264) ret=42a80c4c 000b:Ret gdi32.GetObjectW() retval=00000018 ret=42a80c4c 000b:Call gdi32.CreateCompatibleDC(00000000) ret=42a80c6d 000b:Ret gdi32.CreateCompatibleDC() retval=000003ac ret=42a80c6d 000b:Call gdi32.GetObjectW(0000038c,00000018,0033e1d8) ret=42a803de 000b:Ret gdi32.GetObjectW() retval=00000018 ret=42a803de 000b:Call gdi32.SelectObject(000003ac,0000038c) ret=42a80411 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a80411 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=42a80438 000b:Ret ntdll.RtlAllocateHeap() retval=00148220 ret=42a80438 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000400) ret=42a804b7 000b:Ret ntdll.RtlAllocateHeap() retval=00148650 ret=42a804b7 000b:Call gdi32.GetDIBits(000003ac,0000038c,00000000,00000010,00148650,00148220,00000000) ret=42a804f3 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000b:Ret gdi32.GetDIBits() retval=fffffff0 ret=42a804f3 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42a8054c 000b:Ret ntdll.RtlAllocateHeap() retval=00144030 ret=42a8054c 000b:Call ntdll.RtlAllocateHeap(00110000,00000008,00000400) ret=42a805d7 000b:Ret ntdll.RtlAllocateHeap() retval=00148a58 ret=42a805d7 000b:Call gdi32.GetDIBits(000003ac,000003a8,00000000,00000010,00148a58,00144030,00000000) ret=42a80619 000b:Ret gdi32.GetDIBits() retval=fffffff0 ret=42a80619 000b:Call gdi32.StretchDIBits(00000298,00000000,00000000,00000010,00000010,00000000,00000000,00000010,00000010,00148650,00148220,00000000,00cc0020) ret=42a80a8a 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,0000000d,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".wri",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"wrifile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001403d8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001403d8 L"\7b50\0014\00c8\0011indows\\system32\\wordpad.exe %1",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=00140428 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140428) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".wri",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000b:Ret gdi32.StretchDIBits() retval=00000010 ret=42a80a8a 000b:Call gdi32.StretchDIBits(000002a4,00000000,00000000,00000010,00000010,00000000,00000000,00000010,00000010,00148a58,00144030,00000000,00cc0020) ret=42a8086d 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000b:Ret gdi32.StretchDIBits() retval=00000010 ret=42a8086d 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00148220) ret=42a808c2 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808c2 ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00140428 ret=42670501 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00144030) ret=42a808e5 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808e5 000,00000000,00140428,0033f5fc) ret=4267053a 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00148650) ret=42a80908 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a80908 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00148a58) ret=42a8092b 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a8092b 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,00140428 L"wrifile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000b:Ret user32.DestroyIcon() retval=00000001 ret=42a80e07 4267062c 000b:Call gdi32.DeleteDC(000003ac) ret=42a80e1c t=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000b:Ret gdi32.DeleteDC() retval=00000001 ret=42a80e1c 000b:Call gdi32.DeleteObject(0000038c) ret=42a80e2e 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e2e 000b:Call gdi32.DeleteObject(000003a8) ret=42a80e40 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e40 000b:Ret comctl32.ImageList_ReplaceIcon() retval=00000000 ret=426857bd 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 03a) ret=426857e1 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 00000020,00004000) ret=42a80bfc 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000046) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00147b50,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,0000000e,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000000 ret=401c92fb 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,00000000,0033fb2c) ret=401c18ca 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".xml",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"xmlfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,001403d8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000001 ret=401c18ca 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=401c18f5 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c18f5 000d:Call shlwapi.AssocQueryStringW(00000000,00000001,0013f3a8,401cb976,001403d8 L"\7b50\0014\00c8\0011indows\\system32\\winebrowser.exe -nohome",0033fb2c) ret=401c1924 000d:Call shell32.102(00000000,0033f9b0,00000000,405cf4d8,0033fa0c) ret=4059972a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000018) ret=4269b96e 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=4269b96e 000d:Call ole32.CoTaskMemAlloc(00000010) ret=4269c0ac 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42b9cfa3 000d:Ret ntdll.RtlAllocateHeap() retval=00145078 ret=42b9cfa3 000d:Ret ole32.CoTaskMemAlloc() retval=00145078 ret=4269c0ac 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4269c573 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4269c573 000d:Ret shell32.102() retval=00000000 ret=4059972a 000d:Call advapi32.RegOpenKeyExW(80000000,0013f3a8 L".xml",00000000,00020019,00145080) ret=42670c69 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670c69 000d:Call advapi32.RegOpenKeyExW(00000044,426e8cee L"ProgID",00000000,00020019,00145084) ret=42670dcc 000d:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=42670dcc 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000010) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=001465e8 ret=42670501 000d:Call advapi32.RegQueryValueExW(00000044,00000000,00000000,00000000,001465e8,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegOpenKeyExW(80000000,001465e8 L"xmlfile",00000000,00020019,0033f678) ret=42670606 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=42670606 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001465e8) ret=4267062c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4267062c 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cd2 L"shell",00000000,00020019,0033f674) ret=4267067c 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267067c 000d:Call advapi32.RegCloseKey(00000048) ret=4267068c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267068c 000d:Call advapi32.RegOpenKeyExW(0000004c,401cb976 L"open",00000000,00020019,0033f670) ret=426706c2 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=426706c2 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=426706e8 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=426706e8 000d:Call advapi32.RegCloseKey(0000004c) ret=426706f6 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=426706f6 000d:Call advapi32.RegOpenKeyExW(00000048,426e8cde L"command",00000000,00020019,0033f67c) ret=4267072e 000d:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=4267072e 000d:Call advapi32.RegCloseKey(00000048) ret=4267073e 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267073e 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00000000,0033f5fc) ret=426704b3 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426704b3 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000058) ret=42670501 000d:Ret ntdll.RtlAllocateHeap() retval=00147b50 ret=42670501 000d:Call advapi32.RegQueryValueExW(0000004c,00000000,00000000,00000000,00147b50,0033f5fc) ret=4267053a 000d:Ret advapi32.RegQueryValueExW() retval=00000000 ret=4267053a 000d:Call advapi32.RegCloseKey(0000004c) ret=4267079d 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=4267079d 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00147b50) ret=42671297 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42671297 000d:Call advapi32.RegCloseKey(00000044) ret=42670b01 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=42670b01 000d:Call advapi32.RegCloseKey(00000000) ret=42670b0f 000d:Ret advapi32.RegCloseKey() retval=00000006 ret=42670b0f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145078) ret=42670b2f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42670b2f 000d:Ret shlwapi.AssocQueryStringW() retval=00000000 ret=401c1924 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c955f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c955f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401c9282 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9282 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000800) ret=401c92a8 000d:Ret ntdll.RtlAllocateHeap() retval=0013f3a8 ret=401c92a8 000d:Call advapi32.RegEnumKeyExW(00000040,0000000f,0013f3a8,0033fe0c,00000000,00000000,00000000,00000000) ret=401c92fb 000d:Ret advapi32.RegEnumKeyExW() retval=00000103 ret=401c92fb 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f3a8) ret=401c934f 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c934f 000d:Call advapi32.RegCloseKey(00000040) ret=401c968c 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c968c 000d:Call KERNEL32.ReleaseSemaphore(00000030,00000001,00000000) ret=401c943d 000d:Ret KERNEL32.ReleaseSemaphore() retval=00000001 ret=401c943d 000d:Call KERNEL32.CloseHandle(00000030) ret=401c944b 000d:Ret KERNEL32.CloseHandle() retval=00000001 ret=401c944b 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f318) ret=401c8caf 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8caf 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f340) ret=401c8cd5 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8cd5 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f378) ret=401c8cfb 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8cfb 000d:Call advapi32.RegCreateKeyW(80000001,401cb980 L"Software\\Wine\\MenuFiles",0033fb3c) ret=401c1b1a 000d:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401c1b1a 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000000,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Caesar III Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000073 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000073) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Caesar III Website.menu",ffffffff,001464b0,00000073,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000073 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Caesar III Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000077 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000077) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Caesar III Website.lnk",ffffffff,00140460,00000077,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000077 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000001,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Empire Earth Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000075 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000075) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Empire Earth Website.menu",ffffffff,001464b0,00000075,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000075 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Empire Earth Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000079 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000079) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Empire Earth Website.lnk",ffffffff,00140460,00000079,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000079 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000002,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Frequency Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000072 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000072) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Frequency Website.menu",ffffffff,001464b0,00000072,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000072 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Frequency Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000076 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000076) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Frequency Website.lnk",ffffffff,00140460,00000076,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000076 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000003,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Impressions Games Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007a ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007a) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Impressions Games Website.menu",ffffffff,001464b0,0000007a,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007a ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Impressions Games Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007e ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007e) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Impressions Games Website.lnk",ffffffff,00140460,0000007e,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007e ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000004,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Pharaoh Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000070 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000070) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Pharaoh Website.menu",ffffffff,001464b0,00000070,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000070 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Pharaoh Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000074 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Pharaoh Website.lnk",ffffffff,00140460,00000074,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000074 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000005,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Sierra Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006f ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006f) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Sierra Website.menu",ffffffff,001464b0,0000006f,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006f ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Sierra Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000073 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000073) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Sierra Website.lnk",ffffffff,00140460,00000073,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000073 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000006,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Zeus Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006d ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006d) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Links-Zeus Website.menu",ffffffff,001464b0,0000006d,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006d ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Zeus Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000071 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000071) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Zeus Website.lnk",ffffffff,00140460,00000071,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000071 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000007,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Register Zeus.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000068 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000068) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Register Zeus.menu",ffffffff,001403d8,00000068,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000068 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Register Zeus.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006c ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006c) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Register Zeus.lnk",ffffffff,001464b0,0000006c,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006c ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000008,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Uninstall Zeus.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000069 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000069) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Uninstall Zeus.menu",ffffffff,001464b0,00000069,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000069 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Uninstall Zeus.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006d ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006d) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Uninstall Zeus.lnk",ffffffff,00140460,0000006d,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006d ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000009,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Zeus Readme.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000066 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000066) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Zeus Readme.menu",ffffffff,001403d8,00000066,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000066 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Zeus Readme.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006a ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006a) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Zeus Readme.lnk",ffffffff,001464b0,0000006a,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006a ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000000a,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Zeus.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000005f ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000005f) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Impressions Games-Zeus-Zeus.menu",ffffffff,001403d8,0000005f,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000005f ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Zeus.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000063 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000063) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Zeus.lnk",ffffffff,001464b0,00000063,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000063 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000000b,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Caesar III Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007c ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007c) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Caesar III Website.menu",ffffffff,001464b0,0000007c,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007c ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Caesar III Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000080 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Caesar III Website.lnk",ffffffff,00140460,00000080,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000080 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000000c,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Empire Earth Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007e ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007e) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Empire Earth Website.menu",ffffffff,001464b0,0000007e,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007e ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Empire Earth Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000082 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000082) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Empire Earth Website.lnk",ffffffff,00140460,00000082,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000082 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000000d,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Impressions Games Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000083 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000083) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Impressions Games Website.menu",ffffffff,001464b0,00000083,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000083 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Impressions Games Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000087 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000087) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Impressions Games Website.lnk",ffffffff,00140460,00000087,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000087 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000000e,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Master of Olympus - Zeus Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000008a ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008a) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00140460 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Master of Olympus - Zeus Website.menu",ffffffff,00140460,0000008a,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000008a ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Master of Olympus - Zeus Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000008e ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008e) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Master of Olympus - Zeus Website.lnk",ffffffff,00145148,0000008e,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000008e ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140460) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000000f,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Pharaoh Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000079 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000079) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Pharaoh Website.menu",ffffffff,001464b0,00000079,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000079 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Pharaoh Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007d ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007d) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Pharaoh Website.lnk",ffffffff,00145148,0000007d,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007d ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000010,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Sierra Website.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000078 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000078) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Links-Sierra Website.menu",ffffffff,001464b0,00000078,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000078 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Sierra Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007c ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007c) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Sierra Website.lnk",ffffffff,00145148,0000007c,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007c ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000011,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Master of Olympus - Zeus Readme.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000083 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000083) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Master of Olympus - Zeus Readme.menu",ffffffff,001464b0,00000083,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000083 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus Readme.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000087 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000087) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus Readme.lnk",ffffffff,00145148,00000087,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000087 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000012,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Master of Olympus - Zeus.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007c ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007c) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Master of Olympus - Zeus.menu",ffffffff,001464b0,0000007c,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007c ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000080 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus.lnk",ffffffff,00145148,00000080,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000080 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000013,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Uninstall Master of Olympus - Zeus.menu",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000086 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000086) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.config/menus/applications-merged/wine-Programs-Sierra-Master of Olympus - Zeus-Uninstall Master of Olympus - Zeus.menu",ffffffff,001464b0,00000086,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000086 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Uninstall Master of Olympus - Zeus.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000008a ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008a) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Uninstall Master of Olympus - Zeus.lnk",ffffffff,00145148,0000008a,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000008a ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000014,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Caesar III Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006e ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006e) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Caesar III Website.desktop",ffffffff,001464b0,0000006e,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006e ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Caesar III Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000077 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000077) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Caesar III Website.lnk",ffffffff,00145148,00000077,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000077 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000015,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Empire Earth Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000070 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000070) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Empire Earth Website.desktop",ffffffff,001464b0,00000070,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000070 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Empire Earth Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000079 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000079) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Empire Earth Website.lnk",ffffffff,00145148,00000079,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000079 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000016,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Frequency Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006d ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006d) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Frequency Website.desktop",ffffffff,001464b0,0000006d,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006d ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Frequency Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000076 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000076) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Frequency Website.lnk",ffffffff,00145148,00000076,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000076 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000017,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Impressions Games Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000075 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000075) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Impressions Games Website.desktop",ffffffff,001464b0,00000075,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000075 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Impressions Games Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007e ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007e) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Impressions Games Website.lnk",ffffffff,00145148,0000007e,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007e ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000018,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Pharaoh Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006b ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006b) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Pharaoh Website.desktop",ffffffff,001464b0,0000006b,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006b ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Pharaoh Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000074 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Pharaoh Website.lnk",ffffffff,00145148,00000074,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000074 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000019,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Sierra Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006a ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006a) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Sierra Website.desktop",ffffffff,001464b0,0000006a,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006a ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Sierra Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000073 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000073) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Sierra Website.lnk",ffffffff,00145148,00000073,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000073 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000001a,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Zeus Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000068 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000068) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Links/Zeus Website.desktop",ffffffff,001403d8,00000068,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000068 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Zeus Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000071 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000071) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Links/Zeus Website.lnk",ffffffff,001464b0,00000071,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000071 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000001b,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Register Zeus.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000063 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000063) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Register Zeus.desktop",ffffffff,001403d8,00000063,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000063 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Register Zeus.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006c ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006c) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Register Zeus.lnk",ffffffff,001464b0,0000006c,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006c ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000001c,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Uninstall Zeus.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000064 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000064) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Uninstall Zeus.desktop",ffffffff,001403d8,00000064,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000064 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Uninstall Zeus.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006d ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006d) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Uninstall Zeus.lnk",ffffffff,001464b0,0000006d,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006d ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000001d,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Zeus Readme.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000061 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000061) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Zeus Readme.desktop",ffffffff,001403d8,00000061,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000061 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Zeus Readme.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006a ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000006a) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Zeus Readme.lnk",ffffffff,001464b0,0000006a,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000006a ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000001e,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Zeus.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000005a ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000005a) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001403d8 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Impressions Games/Zeus/Zeus.desktop",ffffffff,001403d8,0000005a,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000005a ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Zeus.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000063 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000063) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Impressions Games/Zeus/Zeus.lnk",ffffffff,001464b0,00000063,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000063 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001403d8) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,0000001f,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Caesar III Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000077 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000077) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Caesar III Website.desktop",ffffffff,001464b0,00000077,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000077 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Caesar III Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000080 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Caesar III Website.lnk",ffffffff,00145148,00000080,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000080 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000020,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Empire Earth Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000079 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000079) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Empire Earth Website.desktop",ffffffff,001464b0,00000079,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000079 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Empire Earth Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000082 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000082) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Empire Earth Website.lnk",ffffffff,00145148,00000082,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000082 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000021,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Impressions Games Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007e ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007e) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Impressions Games Website.desktop",ffffffff,001464b0,0000007e,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007e ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Impressions Games Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000087 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000087) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Impressions Games Website.lnk",ffffffff,00145148,00000087,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000087 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000022,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Master of Olympus - Zeus Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000085 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000085) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Master of Olympus - Zeus Website.desktop",ffffffff,001464b0,00000085,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000085 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Master of Olympus - Zeus Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000008e ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008e) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Master of Olympus - Zeus Website.lnk",ffffffff,00145148,0000008e,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000008e ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000023,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Pharaoh Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000074 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000074) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Pharaoh Website.desktop",ffffffff,001464b0,00000074,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000074 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Pharaoh Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007d ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007d) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Pharaoh Website.lnk",ffffffff,00145148,0000007d,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007d ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000024,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Sierra Website.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000073 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000073) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Links/Sierra Website.desktop",ffffffff,001464b0,00000073,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000073 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Sierra Website.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007c ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007c) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Links/Sierra Website.lnk",ffffffff,00145148,0000007c,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007c ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000025,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus Readme.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007e ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000007e) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus Readme.desktop",ffffffff,001464b0,0000007e,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000007e ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus Readme.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000087 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000087) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus Readme.lnk",ffffffff,00145148,00000087,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000087 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000026,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000077 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000077) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus.desktop",ffffffff,001464b0,00000077,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000077 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000080 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Master of Olympus - Zeus.lnk",ffffffff,00145148,00000080,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000080 ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000027,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000000 ret=401c8e57 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Uninstall Master of Olympus - Zeus.desktop",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000081 ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00000081) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=001464b0 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00140d18 L"/Users/nordam/.local/share/applications/wine/Programs/Sierra/Master of Olympus - Zeus/Uninstall Master of Olympus - Zeus.desktop",ffffffff,001464b0,00000081,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=00000081 ret=401c0614 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Uninstall Master of Olympus - Zeus.lnk",ffffffff,00000000,00000000,00000000,00000000) ret=401c05b1 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000008a ret=401c05b1 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008a) ret=401c05d3 000d:Ret ntdll.RtlAllocateHeap() retval=00145148 ret=401c05d3 000d:Call KERNEL32.WideCharToMultiByte(0000fdf2,00000000,00142d20 L"/Users/nordam/.wine/dosdevices/c:/users/Public/Start Menu/Programs/Sierra/Master of Olympus - Zeus/Uninstall Master of Olympus - Zeus.lnk",ffffffff,00145148,0000008a,00000000,00000000) ret=401c0614 000d:Ret KERNEL32.WideCharToMultiByte() retval=0000008a ret=401c0614 000d:Call ntdll.RtlFreeHeap(00110000,00000000,001464b0) ret=401c90ef 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c90ef 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145148) ret=401c9115 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c9115 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8ed5 000d:Ret ntdll.RtlAllocateHeap() retval=00140d18 ret=401c8ed5 000d:Call ntdll.RtlAllocateHeap(00110000,00000000,00002000) ret=401c8e02 000d:Ret ntdll.RtlAllocateHeap() retval=00142d20 ret=401c8e02 000d:Call advapi32.RegEnumValueW(00000030,00000028,00140d18,0033fe0c,00000000,00000000,00142d20,0033fe08) ret=401c8e57 000d:Ret advapi32.RegEnumValueW() retval=00000103 ret=401c8e57 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140d18) ret=401c8f17 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f17 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00142d20) ret=401c8f3d 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c8f3d 000d:Call advapi32.RegCloseKey(00000030) ret=401c8f56 000d:Ret advapi32.RegCloseKey() retval=00000000 ret=401c8f56 000d:Call KERNEL32.ExitProcess(00000000) ret=401ca300 000d:Call PE DLL (proc=0x436e56a0,module=0x436e0000 L"version.dll",reason=PROCESS_DETACH,res=0x1) 000d:Ret PE DLL (proc=0x436e56a0,module=0x436e0000 L"version.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x436fb010,module=0x436f0000 L"lz32.dll",reason=PROCESS_DETACH,res=0x1) 000d:Ret PE DLL (proc=0x436fb010,module=0x436f0000 L"lz32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x426d9ab0,module=0x42660000 L"shell32.dll",reason=PROCESS_DETACH,res=0x1) 000d:Call comctl32.386(0013ea88,42686e50,00000000) ret=42686397 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00146420) ret=42686e88 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42686e88 000d:Call KERNEL32.GetProcAddress(42b60000,426f68c2 "CoTaskMemFree") ret=426d9a3c 000d:Ret KERNEL32.GetProcAddress() retval=42b6edf0 ret=426d9a3c 000d:Call ole32.CoTaskMemFree(00145618) ret=4269c060 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145618) ret=42b9d389 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42b9d389 000d:Ret ole32.CoTaskMemFree() retval=00000001 ret=4269c060 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00146468) ret=42686e88 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42686e88 000d:Call ole32.CoTaskMemFree(00145638) ret=4269c060 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00145638) ret=42b9d389 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42b9d389 000d:Ret ole32.CoTaskMemFree() retval=00000001 ret=4269c060 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013ec18) ret=42a75a8c 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a75a8c 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013ea88) ret=42a75aaa 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a75aaa 000d:Ret comctl32.386() retval=00000001 ret=42686397 000d:Call comctl32.ImageList_Destroy(0013eca0) ret=426863b4 000d:Call gdi32.DeleteObject(000004c8) ret=42a83a7a 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a83a7a 000d:Call gdi32.DeleteObject(000004cc) ret=42a83a8c 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a83a8c 000d:Call gdi32.DeleteDC(00000298) ret=42a83a9e 000d:Ret gdi32.DeleteDC() retval=00000001 ret=42a83a9e 000d:Call gdi32.DeleteDC(000002a4) ret=42a83ab0 000d:Ret gdi32.DeleteDC() retval=00000001 ret=42a83ab0 000d:Call gdi32.DeleteObject(000002c0) ret=42a83ac2 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a83ac2 000d:Call gdi32.DeleteObject(000002cc) ret=42a83ad4 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a83ad4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013f288) ret=42a83b01 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a83b01 000d:Call ntdll.RtlFreeHeap(00110000,00000000,0013eca0) ret=42a83b21 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a83b21 000d:Ret comctl32.ImageList_Destroy() retval=00000001 ret=426863b4 000d:Call comctl32.ImageList_Destroy(00140700) ret=426863cd 000d:Call gdi32.DeleteObject(00000564) ret=42a83a7a 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a83a7a 000d:Call gdi32.DeleteObject(00000568) ret=42a83a8c 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a83a8c 000d:Call gdi32.DeleteDC(000002d0) ret=42a83a9e 000b:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000b 000b:trace:seh:raise_exception info[0]=00000001 000b:trace:seh:raise_exception info[1]=00380000 000b:trace:seh:raise_exception eax=00000000 ebx=000003f8 ecx=00000000 edx=00000000 esi=00000001 edi=00380000 000b:trace:seh:raise_exception ebp=0033ded8 esp=0033de50 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010246 000b:trace:seh:call_vectored_handlers calling handler at 0x4311ac30 code=c0000005 flags=0 000b:trace:seh:call_vectored_handlers handler at 0x4311ac30 returned ffffffff 000b:Ret user32.CopyImage() retval=0002003c ret=42a80bfc 000b:Call user32.GetIconInfo(0002003c,0033e27c) ret=42a80c27 000b:Ret user32.GetIconInfo() retval=00000001 ret=42a80c27 000b:Call gdi32.GetObjectW(00000430,00000018,0033e264) ret=42a80c4c 000b:Ret gdi32.GetObjectW() retval=00000018 ret=42a80c4c 000b:Call gdi32.CreateCompatibleDC(00000000) ret=42a80c6d 000b:Ret gdi32.CreateCompatibleDC() retval=00000434 ret=42a80c6d 000b:Call gdi32.GetObjectW(00000414,00000018,0033e1d8) ret=42a803de 000b:Ret gdi32.GetObjectW() retval=00000018 ret=42a803de 000b:Call gdi32.SelectObject(00000434,00000414) ret=42a80411 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a80411 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=42a80438 000b:Ret ntdll.RtlAllocateHeap() retval=00148e20 ret=42a80438 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=42a804b7 000b:Ret ntdll.RtlAllocateHeap() retval=00149250 ret=42a804b7 000b:Call gdi32.GetDIBits(00000434,00000414,00000000,00000020,00149250,00148e20,00000000) ret=42a804f3 000b:Ret gdi32.GetDIBits() retval=ffffffe0 ret=42a804f3 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42a8054c 000b:Ret ntdll.RtlAllocateHeap() retval=00144030 ret=42a8054c 000b:Call ntdll.RtlAllocateHeap(00110000,00000008,00001000) ret=42a805d7 000b:Ret ntdll.RtlAllocateHeap() retval=0014a258 ret=42a805d7 000b:Call gdi32.GetDIBits(00000434,00000430,00000000,00000020,0014a258,00144030,00000000) ret=42a80619 000b:Ret gdi32.GetDIBits() retval=ffffffe0 ret=42a80619 000b:Call gdi32.StretchDIBits(000002d0,00000000,00000000,00000020,00000020,00000000,00000000,00000020,00000020,00149250,00148e20,00000000,00cc0020) ret=42a80a8a 000b:Ret gdi32.StretchDIBits() retval=00000020 ret=42a80a8a 000b:Call gdi32.StretchDIBits(000002dc,00000000,00000000,00000020,00000020,00000000,00000000,00000020,00000020,0014a258,00144030,00000000,00cc0020) ret=42a8086d 000b:Ret gdi32.StretchDIBits() retval=00000020 ret=42a8086d 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00148e20) ret=42a808c2 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808c2 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00144030) ret=42a808e5 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808e5 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00149250) ret=42a80908 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a80908 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0014a258) ret=42a8092b 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a8092b 000b:Call user32.DestroyIcon(0002003c) ret=42a80e07 000b:Ret user32.DestroyIcon() retval=00000001 ret=42a80e07 000b:Call gdi32.DeleteDC(00000434) ret=42a80e1c 000b:Ret gdi32.DeleteDC() retval=00000001 ret=42a80e1c 000b:Call gdi32.DeleteObject(00000414) ret=42a80e2e 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e2e 000b:Call gdi32.DeleteObject(00000430) ret=42a80e40 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e40 000b:Ret comctl32.ImageList_ReplaceIcon() retval=00000000 ret=426857e1 000b:Call ole32.CoTaskMemAlloc(00000014) ret=4269c0ac 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=43520fa3 000b:Ret ntdll.RtlAllocateHeap() retval=001437b8 ret=43520fa3 000b:Ret ole32.CoTaskMemAlloc() retval=001437b8 ret=4269c0ac 000b:Call KERNEL32.GetFullPathNameW(4282d1e0 L"C:\\windows\\system32\\shell32.dll",00000104,0033e3a8,00000000) ret=426856e6 000b:Ret KERNEL32.GetFullPathNameW() retval=0000001f ret=426856e6 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000040) ret=4268572e 000b:Ret ntdll.RtlAllocateHeap() retval=001437d8 ret=4268572e 000b:Call comctl32.334(0013d090,00007fff,001437b8) ret=42685791 000b:Ret comctl32.334() retval=00000001 ret=42685791 000b:Call comctl32.ImageList_ReplaceIcon(0013d2a8,ffffffff,00010038) ret=426857bd 000b:Call user32.CopyImage(00010038,00000001,00000010,00000010,00004000) ret=42a80bfc 000b:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000b 000b:trace:seh:raise_exception info[0]=00000001 000b:trace:seh:raise_exception info[1]=00380000 000b:trace:seh:raise_exception eax=9999cccc ebx=00000480 ecx=000000ac edx=00000067 esi=00000001 edi=00380000 000b:trace:seh:raise_exception ebp=0033ded8 esp=0033de50 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010a02 000b:trace:seh:call_vectored_handlers calling handler at 0x4311ac30 code=c0000005 flags=0 000b:trace:seh:call_vectored_handlers handler at 0x4311ac30 returned ffffffff 000b:Ret user32.CopyImage() retval=0003003c ret=42a80bfc 000b:Call user32.GetIconInfo(0003003c,0033e27c) ret=42a80c27 000b:Ret user32.GetIconInfo() retval=00000001 ret=42a80c27 000b:Call gdi32.GetObjectW(000004b8,00000018,0033e264) ret=42a80c4c 000b:Ret gdi32.GetObjectW() retval=00000018 ret=42a80c4c 000b:Call gdi32.CreateCompatibleDC(00000000) ret=42a7f859 000b:Ret gdi32.CreateCompatibleDC() retval=000004bc ret=42a7f859 000b:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42a6c623 000b:Ret KERNEL32.LocalAlloc() retval=00147b78 ret=42a6c623 000b:Call gdi32.CreateDIBSection(000004bc,00147b78,00000000,0033e17c,00000000,00000000) ret=42a7f5b7 000b:Ret gdi32.CreateDIBSection() retval=000004c8 ret=42a7f5b7 000b:Call KERNEL32.LocalFree(00147b78) ret=42a6c36b 000b:Ret KERNEL32.LocalFree() retval=00000000 ret=42a6c36b 000b:Call gdi32.SelectObject(000004bc,000004c8) ret=42a7f9a2 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a7f9a2 000b:Call gdi32.BitBlt(000004bc,00000000,00000000,00000040,00000090,00000298,00000000,00000000,00cc0020) ret=42a7f9ef 000b:Ret gdi32.BitBlt() retval=00000001 ret=42a7f9ef 000b:Call gdi32.SelectObject(000004bc,0000006c) ret=42a7fa01 000b:Ret gdi32.SelectObject() retval=000004c8 ret=42a7fa01 000b:Call gdi32.SelectObject(00000298,000004c8) ret=42a7f891 000b:Ret gdi32.SelectObject() retval=000002b0 ret=42a7f891 000b:Call gdi32.DeleteObject(000002b0) ret=42a7f89f 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a7f89f 000b:Call gdi32.CreateBitmap(00000040,00000090,00000001,00000001,00000000) ret=42a7f93a 000b:Ret gdi32.CreateBitmap() retval=000004cc ret=42a7f93a 000b:Call gdi32.SelectObject(000004bc,000004cc) ret=42a7faa7 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a7faa7 000b:Call gdi32.BitBlt(000004bc,00000000,00000000,00000040,00000090,000002a4,00000000,00000000,00cc0020) ret=42a7faf4 000b:Ret gdi32.BitBlt() retval=00000001 ret=42a7faf4 000b:Call gdi32.SelectObject(000004bc,0000006c) ret=42a7fb06 000b:Ret gdi32.SelectObject() retval=000004cc ret=42a7fb06 000b:Call gdi32.SelectObject(000002a4,000004cc) ret=42a7f965 000b:Ret gdi32.SelectObject() retval=000002b4 ret=42a7f965 000b:Call gdi32.DeleteObject(000002b4) ret=42a7f973 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a7f973 000b:Call ntdll.RtlReAllocateHeap(00110000,00000008,0013d890,00000022) ret=42a7f8dc 000b:Ret ntdll.RtlReAllocateHeap() retval=0013d890 ret=42a7f8dc 000b:Call gdi32.DeleteDC(000004bc) ret=42a7f8fe 000b:Ret gdi32.DeleteDC() retval=00000001 ret=42a7f8fe 000b:Call gdi32.CreateCompatibleDC(00000000) ret=42a80c6d 000b:Ret gdi32.CreateCompatibleDC() retval=000004d0 ret=42a80c6d 000b:Call gdi32.GetObjectW(0000049c,00000018,0033e1d8) ret=42a803de 000b:Ret gdi32.GetObjectW() retval=00000018 ret=42a803de 000b:Call gdi32.SelectObject(000004d0,0000049c) ret=42a80411 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a80411 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=42a80438 000b:Ret ntdll.RtlAllocateHeap() retval=0013d8c0 ret=42a80438 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000400) ret=42a804b7 000b:Ret ntdll.RtlAllocateHeap() retval=0013dcf0 ret=42a804b7 000b:Call gdi32.GetDIBits(000004d0,0000049c,00000000,00000010,0013dcf0,0013d8c0,00000000) ret=42a804f3 000b:Ret gdi32.GetDIBits() retval=fffffff0 ret=42a804f3 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42a8054c 000b:Ret ntdll.RtlAllocateHeap() retval=00144bc8 ret=42a8054c 000b:Call ntdll.RtlAllocateHeap(00110000,00000008,00000400) ret=42a805d7 000b:Ret ntdll.RtlAllocateHeap() retval=0013e0f8 ret=42a805d7 000b:Call gdi32.GetDIBits(000004d0,000004b8,00000000,00000010,0013e0f8,00144bc8,00000000) ret=42a80619 000b:Ret gdi32.GetDIBits() retval=fffffff0 ret=42a80619 000b:Call gdi32.StretchDIBits(00000298,00000010,00000000,00000010,00000010,00000000,00000000,00000010,00000010,0013dcf0,0013d8c0,00000000,00cc0020) ret=42a80a8a 000b:Ret gdi32.StretchDIBits() retval=00000010 ret=42a80a8a 000b:Call gdi32.StretchDIBits(000002a4,00000010,00000000,00000010,00000010,00000000,00000000,00000010,00000010,0013e0f8,00144bc8,00000000,00cc0020) ret=42a8086d 000b:Ret gdi32.StretchDIBits() retval=00000010 ret=42a8086d 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0013d8c0) ret=42a808c2 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808c2 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00144bc8) ret=42a808e5 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808e5 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0013dcf0) ret=42a80908 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a80908 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0013e0f8) ret=42a8092b 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a8092b 000b:Call user32.DestroyIcon(0003003c) ret=42a80e07 000b:Ret user32.DestroyIcon() retval=00000001 ret=42a80e07 000b:Call gdi32.DeleteDC(000004d0) ret=42a80e1c 000b:Ret gdi32.DeleteDC() retval=00000001 ret=42a80e1c 000b:Call gdi32.DeleteObject(0000049c) ret=42a80e2e 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e2e 000b:Call gdi32.DeleteObject(000004b8) ret=42a80e40 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e40 000b:Ret comctl32.ImageList_ReplaceIcon() retval=00000001 ret=426857bd 000b:Call comctl32.ImageList_ReplaceIcon(0013ed08,ffffffff,0001003a) ret=426857e1 000b:Call user32.CopyImage(0001003a,00000001,00000020,00000020,00004000) ret=42a80bfc 000b:trace:seh:raise_exception code=c0000005 flags=0 addr=0x428872cd ip=428872cd tid=000b 000b:trace:seh:raise_exception info[0]=00000001 000b:trace:seh:raise_exception info[1]=00340000 000b:trace:seh:raise_exception eax=00000000 ebx=0000051c ecx=00000000 edx=00000000 esi=00000001 edi=00340000 000b:trace:seh:raise_exception ebp=0033ded8 esp=0033de50 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010246 000b:trace:seh:call_vectored_handlers calling handler at 0x4311ac30 code=c0000005 flags=0 000b:trace:seh:call_vectored_handlers handler at 0x4311ac30 returned ffffffff 000b:Ret user32.CopyImage() retval=0004003c ret=42a80bfc 000b:Call user32.GetIconInfo(0004003c,0033e27c) ret=42a80c27 000b:Ret user32.GetIconInfo() retval=00000001 ret=42a80c27 000b:Call gdi32.GetObjectW(00000554,00000018,0033e264) ret=42a80c4c 000b:Ret gdi32.GetObjectW() retval=00000018 ret=42a80c4c 000b:Call gdi32.CreateCompatibleDC(00000000) ret=42a7f859 000b:Ret gdi32.CreateCompatibleDC() retval=00000558 ret=42a7f859 000b:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42a6c623 000b:Ret KERNEL32.LocalAlloc() retval=00143848 ret=42a6c623 000b:Call gdi32.CreateDIBSection(00000558,00143848,00000000,0033e17c,00000000,00000000) ret=42a7f5b7 000b:Ret gdi32.CreateDIBSection() retval=00000564 ret=42a7f5b7 000b:Call KERNEL32.LocalFree(00143848) ret=42a6c36b 000b:Ret KERNEL32.LocalFree() retval=00000000 ret=42a6c36b 000b:Call gdi32.SelectObject(00000558,00000564) ret=42a7f9a2 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a7f9a2 000b:Call gdi32.BitBlt(00000558,00000000,00000000,00000080,00000120,000002d0,00000000,00000000,00cc0020) ret=42a7f9ef 000b:Ret gdi32.BitBlt() retval=00000001 ret=42a7f9ef 000b:Call gdi32.SelectObject(00000558,0000006c) ret=42a7fa01 000b:Ret gdi32.SelectObject() retval=00000564 ret=42a7fa01 000b:Call gdi32.SelectObject(000002d0,00000564) ret=42a7f891 000b:Ret gdi32.SelectObject() retval=000002e8 ret=42a7f891 000b:Call gdi32.DeleteObject(000002e8) ret=42a7f89f 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a7f89f 000b:Call gdi32.CreateBitmap(00000080,00000120,00000001,00000001,00000000) ret=42a7f93a 000b:Ret gdi32.CreateBitmap() retval=00000568 ret=42a7f93a 000b:Call gdi32.SelectObject(00000558,00000568) ret=42a7faa7 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a7faa7 000b:Call gdi32.BitBlt(00000558,00000000,00000000,00000080,00000120,000002dc,00000000,00000000,00cc0020) ret=42a7faf4 000b:Ret gdi32.BitBlt() retval=00000001 ret=42a7faf4 000b:Call gdi32.SelectObject(00000558,0000006c) ret=42a7fb06 000b:Ret gdi32.SelectObject() retval=00000568 ret=42a7fb06 000b:Call gdi32.SelectObject(000002dc,00000568) ret=42a7f965 000b:Ret gdi32.SelectObject() retval=000002ec ret=42a7f965 000b:Call gdi32.DeleteObject(000002ec) ret=42a7f973 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a7f973 000b:Call ntdll.RtlReAllocateHeap(00110000,00000008,0013f2f0,00000022) ret=42a7f8dc 000b:Ret ntdll.RtlReAllocateHeap() retval=0013f2f0 ret=42a7f8dc 000b:Call gdi32.DeleteDC(00000558) ret=42a7f8fe 000b:Ret gdi32.DeleteDC() retval=00000001 ret=42a7f8fe 000b:Call gdi32.CreateCompatibleDC(00000000) ret=42a80c6d 000b:Ret gdi32.CreateCompatibleDC() retval=0000056c ret=42a80c6d 000b:Call gdi32.GetObjectW(00000538,00000018,0033e1d8) ret=42a803de 000b:Ret gdi32.GetObjectW() retval=00000018 ret=42a803de 000b:Call gdi32.SelectObject(0000056c,00000538) ret=42a80411 000b:Ret gdi32.SelectObject() retval=0000006c ret=42a80411 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=42a80438 000b:Ret ntdll.RtlAllocateHeap() retval=00147cc0 ret=42a80438 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=42a804b7 000b:Ret ntdll.RtlAllocateHeap() retval=0013f320 ret=42a804b7 000b:Call gdi32.GetDIBits(0000056c,00000538,00000000,00000020,0013f320,00147cc0,00000000) ret=42a804f3 000b:Ret gdi32.GetDIBits() retval=ffffffe0 ret=42a804f3 000b:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42a8054c 000b:Ret ntdll.RtlAllocateHeap() retval=00144b90 ret=42a8054c 000b:Call ntdll.RtlAllocateHeap(00110000,00000008,00001000) ret=42a805d7 000b:Ret ntdll.RtlAllocateHeap() retval=00140328 ret=42a805d7 000b:Call gdi32.GetDIBits(0000056c,00000554,00000000,00000020,00140328,00144b90,00000000) ret=42a80619 000b:Ret gdi32.GetDIBits() retval=ffffffe0 ret=42a80619 000b:Call gdi32.StretchDIBits(000002d0,00000020,00000000,00000020,00000020,00000000,00000000,00000020,00000020,0013f320,00147cc0,00000000,00cc0020) ret=42a80a8a 000b:Ret gdi32.StretchDIBits() retval=00000020 ret=42a80a8a 000b:Call gdi32.StretchDIBits(000002dc,00000020,00000000,00000020,00000020,00000000,00000000,00000020,00000020,00140328,00144b90,00000000,00cc0020) ret=42a8086d 000b:Ret gdi32.StretchDIBits() retval=00000020 ret=42a8086d 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00147cc0) ret=42a808c2 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808c2 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00144b90) ret=42a808e5 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a808e5 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0013f320) ret=42a80908 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a80908 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00140328) ret=42a8092b 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a8092b 000b:Call user32.DestroyIcon(0004003c) ret=42a80e07 000b:Ret user32.DestroyIcon() retval=00000001 ret=42a80e07 000b:Call gdi32.DeleteDC(0000056c) ret=42a80e1c 000b:Ret gdi32.DeleteDC() retval=00000001 ret=42a80e1c 000b:Call gdi32.DeleteObject(00000538) ret=42a80e2e 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e2e 000b:Call gdi32.DeleteObject(00000554) ret=42a80e40 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a80e40 000b:Ret comctl32.ImageList_ReplaceIcon() retval=00000001 ret=426857e1 000b:Ret PE DLL (proc=0x426d9ab0,module=0x42660000 L"shell32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 000b:Ret KERNEL32.LoadLibraryA() retval=42660000 ret=401c4ccb 000b:Call KERNEL32.GetProcAddress(42660000,401ca9da "SHGetFolderPathW") ret=401c4c9c 000b:Ret KERNEL32.GetProcAddress() retval=4266e3c4 ret=401c4c9c 000b:Call shell32.SHGetFolderPathW(00000000,0000001a,00000000,00000000,0033ecfc) ret=401c149e 000b:Call advapi32.RegCreateKeyW(80000001,426e9940 L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders",0033e640) ret=426a445c 000b:Ret advapi32.RegCreateKeyW() retval=00000000 ret=426a445c 000b:Call advapi32.RegCreateKeyW(80000001,426e98a0 L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders",0033e644) ret=426a4480 000b:Ret advapi32.RegCreateKeyW() retval=00000000 ret=426a4480 000b:Call advapi32.RegQueryValueExW(0000003c,426e9e1c L"AppData",00000000,0033e64c,0033e774,0033e648) ret=426a44bd 000b:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426a44bd 000b:Call advapi32.RegCreateKeyExW(80000002,426e9b40 L"Software\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList",00000000,00000000,00000000,000f003f,00000000,0033dfbc,0033dfb8) ret=426a240e 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=426a240e 000b:Call KERNEL32.GetSystemDirectoryW(0033d9a0,00000104) ret=426a244b 000b:Ret KERNEL32.GetSystemDirectoryW() retval=00000013 ret=426a244b 000b:Call advapi32.RegQueryValueExW(00000040,426e9a40 L"ProfilesDirectory",00000000,0033d90c,0033dba8,0033d908) ret=426a1ff7 000b:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426a1ff7 000b:Call advapi32.GetUserNameW(0033d9a0,0033dfb8) ret=426a26b9 000b:Ret advapi32.GetUserNameW() retval=00000001 ret=426a26b9 000b:Call shlwapi.PathAppendW(0033e028 L"C:\\users",0033d9a0 L"nordam") ret=426a26ce 000b:Ret shlwapi.PathAppendW() retval=00000001 ret=426a26ce 000b:Call shlwapi.PathAppendW(0033e028 L"C:\\users\\nordam",0033ddca L"\\Application Data") ret=426a2700 000b:Ret shlwapi.PathAppendW() retval=00000001 ret=426a2700 000b:Call advapi32.RegCloseKey(00000040) ret=426a22cb 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a22cb 000b:Call advapi32.RegSetValueExW(00000034,426e9e1c L"AppData",00000000,00000001,0033e774,00000042) ret=426a4572 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=426a4572 000b:Call advapi32.RegCloseKey(00000034) ret=426a44d4 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a44d4 000b:Call advapi32.RegCloseKey(0000003c) ret=426a44e2 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a44e2 000b:Call shlwapi.PathFileExistsW(0033e97c L"C:\\users\\nordam\\Application Data") ret=426a5271 000b:Call KERNEL32.SetErrorMode(00000001) ret=407ab31f 000b:Ret KERNEL32.SetErrorMode() retval=00000000 ret=407ab31f 000b:Call KERNEL32.GetFileAttributesW(0033e97c L"C:\\users\\nordam\\Application Data") ret=407ab32c 000b:Ret KERNEL32.GetFileAttributesW() retval=00000010 ret=407ab32c 000b:Call KERNEL32.SetErrorMode(00000000) ret=407ab339 000b:Ret KERNEL32.SetErrorMode() retval=00000001 ret=407ab339 000b:Ret shlwapi.PathFileExistsW() retval=00000001 ret=426a5271 000b:Ret shell32.SHGetFolderPathW() retval=00000000 ret=401c149e 000b:Call advapi32.RegSetValueExW(00000020,401c61ac L"APPDATA",00000000,00000001,0033ecfc,00000042) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(00000020,401c6196 L"CLIENTNAME",00000000,00000001,401c60d8,00000010) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call shell32.SHGetFolderPathW(00000000,00000028,00000000,00000000,0033ecfc) ret=401c14f1 000b:Call advapi32.RegCreateKeyW(80000001,426e9940 L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders",0033e640) ret=426a445c 000b:Ret advapi32.RegCreateKeyW() retval=00000000 ret=426a445c 000b:Call advapi32.RegCreateKeyW(80000001,426e98a0 L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders",0033e644) ret=426a4480 000b:Ret advapi32.RegCreateKeyW() retval=00000000 ret=426a4480 000b:Call advapi32.RegQueryValueExW(0000003c,00000000,00000000,0033e64c,0033e774,0033e648) ret=426a44bd 000b:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426a44bd 000b:Call advapi32.RegCloseKey(00000034) ret=426a44d4 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a44d4 000b:Call advapi32.RegCloseKey(0000003c) ret=426a44e2 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a44e2 000b:Call advapi32.RegCreateKeyW(80000002,426e9940 L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders",0033e640) ret=426a445c 000b:Ret advapi32.RegCreateKeyW() retval=00000000 ret=426a445c 000b:Call advapi32.RegCreateKeyW(80000002,426e98a0 L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders",0033e644) ret=426a4480 000b:Ret advapi32.RegCreateKeyW() retval=00000000 ret=426a4480 000b:Call advapi32.RegQueryValueExW(0000003c,00000000,00000000,0033e64c,0033e774,0033e648) ret=426a44bd 000b:Ret advapi32.RegQueryValueExW() retval=00000002 ret=426a44bd 000b:Call advapi32.RegCloseKey(00000034) ret=426a44d4 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a44d4 000b:Call advapi32.RegCloseKey(0000003c) ret=426a44e2 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a44e2 000b:Call advapi32.RegCreateKeyExW(80000002,426e9b40 L"Software\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList",00000000,00000000,00000000,000f003f,00000000,0033e6fc,0033e6f8) ret=426a240e 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=426a240e 000b:Call KERNEL32.GetSystemDirectoryW(0033e0e0,00000104) ret=426a244b 000b:Ret KERNEL32.GetSystemDirectoryW() retval=00000013 ret=426a244b 000b:Call advapi32.RegQueryValueExW(00000034,426e9a40 L"ProfilesDirectory",00000000,0033e04c,0033e2e8,0033e048) ret=426a1ff7 000b:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426a1ff7 000b:Call advapi32.GetUserNameW(0033e0e0,0033e6f8) ret=426a26b9 000b:Ret advapi32.GetUserNameW() retval=00000001 ret=426a26b9 000b:Call shlwapi.PathAppendW(0033e97c L"C:\\users",0033e0e0 L"nordam") ret=426a26ce 000b:Ret shlwapi.PathAppendW() retval=00000001 ret=426a26ce 000b:Call shlwapi.PathAppendW(0033e97c L"C:\\users\\nordam",0033e50a L"") ret=426a2700 000b:Ret shlwapi.PathAppendW() retval=00000001 ret=426a2700 000b:Call advapi32.RegCloseKey(00000034) ret=426a22cb 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a22cb 000b:Call shlwapi.PathFileExistsW(0033e97c L"C:\\users\\nordam") ret=426a5271 000b:Call KERNEL32.SetErrorMode(00000001) ret=407ab31f 000b:Ret KERNEL32.SetErrorMode() retval=00000000 ret=407ab31f 000b:Call KERNEL32.GetFileAttributesW(0033e97c L"C:\\users\\nordam") ret=407ab32c 000b:Ret KERNEL32.GetFileAttributesW() retval=00000010 ret=407ab32c 000b:Call KERNEL32.SetErrorMode(00000000) ret=407ab339 000b:Ret KERNEL32.SetErrorMode() retval=00000001 ret=407ab339 000b:Ret shlwapi.PathFileExistsW() retval=00000001 ret=426a5271 000b:Ret shell32.SHGetFolderPathW() retval=00000000 ret=401c14f1 000b:Call advapi32.RegSetValueExW(00000020,401c60e8 L"USERPROFILE",00000000,00000001,0033ecfc,00000020) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(00000020,401c6170 L"HOMEPATH",00000000,00000001,0033ed00,0000001c) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(00000020,401c6182 L"HOMEDRIVE",00000000,00000001,0033ecfc,00000006) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.GetUserNameW(0033ecfc,0033ef2c) ret=401c154b 000b:Ret advapi32.GetUserNameW() retval=00000001 ret=401c154b 000b:Call advapi32.RegSetValueExW(00000020,401c6100 L"USERNAME",00000000,00000001,0033ecfc,0000000e) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(00000020,401c615c L"HOMESHARE",00000000,00000001,401c60d6,00000002) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call shell32.SHGetFolderPathW(00000000,0000001c,00000000,00000000,0033ecfc) ret=401c1592 000b:Call advapi32.RegCreateKeyW(80000001,426e9940 L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\Shell Folders",0033e640) ret=426a445c 000b:Ret advapi32.RegCreateKeyW() retval=00000000 ret=426a445c 000b:Call advapi32.RegCreateKeyW(80000001,426e98a0 L"Software\\Microsoft\\Windows\\CurrentVersion\\Explorer\\User Shell Folders",0033e644) ret=426a4480 000b:Ret advapi32.RegCreateKeyW() retval=00000000 ret=426a4480 000b:Call advapi32.RegQueryValueExW(0000003c,426e9e40 L"Local AppData",00000000,0033e64c,0033e774,0033e648) ret=426a44bd 000b:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426a44bd 000b:Call advapi32.RegCreateKeyExW(80000002,426e9b40 L"Software\\Microsoft\\Windows NT\\CurrentVersion\\ProfileList",00000000,00000000,00000000,000f003f,00000000,0033dfbc,0033dfb8) ret=426a240e 000b:Ret advapi32.RegCreateKeyExW() retval=00000000 ret=426a240e 000b:Call KERNEL32.GetSystemDirectoryW(0033d9a0,00000104) ret=426a244b 000b:Ret KERNEL32.GetSystemDirectoryW() retval=00000013 ret=426a244b 000b:Call advapi32.RegQueryValueExW(00000040,426e9a40 L"ProfilesDirectory",00000000,0033d90c,0033dba8,0033d908) ret=426a1ff7 000b:Ret advapi32.RegQueryValueExW() retval=00000000 ret=426a1ff7 000b:Call advapi32.GetUserNameW(0033d9a0,0033dfb8) ret=426a26b9 000b:Ret advapi32.GetUserNameW() retval=00000001 ret=426a26b9 000b:Call shlwapi.PathAppendW(0033e028 L"C:\\users",0033d9a0 L"nordam") ret=426a26ce 000b:Ret shlwapi.PathAppendW() retval=00000001 ret=426a26ce 000b:Call shlwapi.PathAppendW(0033e028 L"C:\\users\\nordam",0033ddca L"\\Local Settings\\Application Data") ret=426a2700 000b:Ret shlwapi.PathAppendW() retval=00000001 ret=426a2700 000b:Call advapi32.RegCloseKey(00000040) ret=426a22cb 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a22cb 000b:Call advapi32.RegSetValueExW(00000034,426e9e40 L"Local AppData",00000000,00000001,0033e774,00000060) ret=426a4572 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=426a4572 000b:Call advapi32.RegCloseKey(00000034) ret=426a44d4 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a44d4 000b:Call advapi32.RegCloseKey(0000003c) ret=426a44e2 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=426a44e2 000b:Call shlwapi.PathFileExistsW(0033e97c L"C:\\users\\nordam\\Local Settings\\Application Data") ret=426a5271 000b:Call KERNEL32.SetErrorMode(00000001) ret=407ab31f 000b:Ret KERNEL32.SetErrorMode() retval=00000000 ret=407ab31f 000b:Call KERNEL32.GetFileAttributesW(0033e97c L"C:\\users\\nordam\\Local Settings\\Application Data") ret=407ab32c 000b:Ret KERNEL32.GetFileAttributesW() retval=00000010 ret=407ab32c 000b:Call KERNEL32.SetErrorMode(00000000) ret=407ab339 000b:Ret KERNEL32.SetErrorMode() retval=00000001 ret=407ab339 000b:Ret shlwapi.PathFileExistsW() retval=00000001 ret=426a5271 000b:Ret shell32.SHGetFolderPathW() retval=00000000 ret=401c1592 000b:Call advapi32.RegSetValueExW(00000020,401c6142 L"LOCALAPPDATA",00000000,00000001,0033ecfc,00000060) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call KERNEL32.GetComputerNameW(0033ef08,0033ef2c) ret=401c15c2 000b:Ret KERNEL32.GetComputerNameW() retval=00000001 ret=401c15c2 000b:Call advapi32.RegSetValueExW(00000020,401c612a L"LOGONSERVER",00000000,00000001,0033ef04,00000024) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegSetValueExW(00000020,401c6112 L"SESSIONNAME",00000000,00000001,401c60d8,00000010) ret=401c13f5 000b:Ret advapi32.RegSetValueExW() retval=00000000 ret=401c13f5 000b:Call advapi32.RegCloseKey(00000020) ret=401c15e8 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c15e8 000b:Call advapi32.RegOpenKeyExW(80000002,401c6200 L"Software\\Microsoft\\Windows\\CurrentVersion",00000000,00020019,0033ef2c) ret=401c16b7 000b:Ret advapi32.RegOpenKeyExW() retval=00000000 ret=401c16b7 000b:Call advapi32.RegOpenKeyExW(00000020,401c58bc L"RunOnce",00000000,000f003f,0033ef28) ret=401c16f8 000b:Ret advapi32.RegOpenKeyExW() retval=00000002 ret=401c16f8 000b:Call advapi32.RegCloseKey(00000020) ret=401c170a 000b:Ret advapi32.RegCloseKey() retval=00000000 ret=401c170a 000b:Call KERNEL32.SetEvent(00000010) ret=401c3ab7 000b:Ret KERNEL32.SetEvent() retval=00000001 ret=401c3ab7 000b:Call KERNEL32.ExitProcess(00000000) ret=401c4d50 000b:Call PE DLL (proc=0x426d9ab0,module=0x42660000 L"shell32.dll",reason=PROCESS_DETACH,res=0x1) 000b:Call comctl32.386(0013d090,42686e50,00000000) ret=42686397 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00143770) ret=42686e88 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42686e88 000b:Call KERNEL32.GetProcAddress(434f0000,426f68c2 "CoTaskMemFree") ret=426d9a3c 000b:Ret KERNEL32.GetProcAddress() retval=434f2df0 ret=426d9a3c 000b:Call ole32.CoTaskMemFree(00143750) ret=4269c060 000b:Call ntdll.RtlFreeHeap(00110000,00000000,00143750) ret=43521389 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=43521389 000b:Ret ole32.CoTaskMemFree() retval=00000001 ret=4269c060 000b:Call ntdll.RtlFreeHeap(00110000,00000000,001437d8) ret=42686e88 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42686e88 000b:Call ole32.CoTaskMemFree(001437b8) ret=4269c060 000b:Call ntdll.RtlFreeHeap(00110000,00000000,001437b8) ret=43521389 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=43521389 000b:Ret ole32.CoTaskMemFree() retval=00000001 ret=4269c060 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0013d220) ret=42a75a8c 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a75a8c 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0013d090) ret=42a75aaa 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a75aaa 000b:Ret comctl32.386() retval=00000001 ret=42686397 000b:Call comctl32.ImageList_Destroy(0013d2a8) ret=426863b4 000b:Call gdi32.DeleteObject(000004c8) ret=42a83a7a 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a83a7a 000b:Call gdi32.DeleteObject(000004cc) ret=42a83a8c 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a83a8c 000b:Call gdi32.DeleteDC(00000298) ret=42a83a9e 000b:Ret gdi32.DeleteDC() retval=00000001 ret=42a83a9e 000b:Call gdi32.DeleteDC(000002a4) ret=42a83ab0 000b:Ret gdi32.DeleteDC() retval=00000001 ret=42a83ab0 000b:Call gdi32.DeleteObject(000002c0) ret=42a83ac2 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a83ac2 000b:Call gdi32.DeleteObject(000002cc) ret=42a83ad4 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a83ad4 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0013d890) ret=42a83b01 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a83b01 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0013d2a8) ret=42a83b21 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a83b21 000b:Ret comctl32.ImageList_Destroy() retval=00000001 ret=426863b4 000b:Call comctl32.ImageList_Destroy(0013ed08) ret=426863cd 000b:Call gdi32.DeleteObject(00000564) ret=42a83a7a 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a83a7a 000b:Call gdi32.DeleteObject(00000568) ret=42a83a8c 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a83a8c 000b:Call gdi32.DeleteDC(000002d0) ret=42a83a9e 000b:Ret gdi32.DeleteDC() retval=00000001 ret=42a83a9e 000b:Call gdi32.DeleteDC(000002dc) ret=42a83ab0 000b:Ret gdi32.DeleteDC() retval=00000001 ret=42a83ab0 000b:Call gdi32.DeleteObject(000002f8) ret=42a83ac2 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a83ac2 000b:Call gdi32.DeleteObject(00000304) ret=42a83ad4 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a83ad4 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0013f2f0) ret=42a83b01 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a83b01 000b:Call ntdll.RtlFreeHeap(00110000,00000000,0013ed08) ret=42a83b21 000b:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a83b21 000b:Ret comctl32.ImageList_Destroy() retval=00000001 ret=426863cd 000b:Call ntdll.RtlDeleteCriticalSection(426f0614) ret=426863e9 000b:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=426863e9 000b:Call ntdll.RtlDeleteCriticalSection(426f04d8) ret=426767c8 000b:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=426767c8 000b:Ret PE DLL (proc=0x426d9ab0,module=0x42660000 L"shell32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x435b9760,module=0x434f0000 L"ole32.dll",reason=PROCESS_DETACH,res=0x1) 000b:Call user32.UnregisterClassW(435c6d20 L"OleMainThreadWndClass 0x######## ",434f0000) ret=435056cb 000b:Ret user32.UnregisterClassW() retval=00000001 ret=435056cb 000b:Ret PE DLL (proc=0x435b9760,module=0x434f0000 L"ole32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x4366b2f0,module=0x43620000 L"rpcrt4.dll",reason=PROCESS_DETACH,res=0x1) 000b:Ret PE DLL (proc=0x4366b2f0,module=0x43620000 L"rpcrt4.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x42af8af0,module=0x42a60000 L"comctl32.dll",reason=PROCESS_DETACH,res=0x1) 000b:Call user32.UnregisterClassW(0033fb76 L"SysAnimate32",00000000) ret=42a630c7 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42a630c7 000b:Call user32.UnregisterClassW(0033fb76 L"ComboBoxEx32",00000000) ret=42a65ce7 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42a65ce7 000b:Call user32.UnregisterClassW(0033fb6c L"SysDateTimePick32",00000000) ret=42a70cd5 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42a70cd5 000b:Call user32.UnregisterClassW(0033fb72 L"flatsb_class32",00000000) ret=42a78033 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42a78033 000b:Call user32.UnregisterClassW(0033fb78 L"SysHeader32",00000000) ret=42a78811 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42a78811 000b:Call user32.UnregisterClassW(0033fb70 L"msctls_hotkey32",00000000) ret=42a7d1c9 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42a7d1c9 000b:Call user32.UnregisterClassW(0033fb72 L"SysIPAddress32",00000000) ret=42a86d03 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42a86d03 000b:Call user32.UnregisterClassW(0033fb74 L"SysListView32",00000000) ret=42a888dd 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42a888dd 000b:Call user32.UnregisterClassW(0033fb74 L"SysMonthCal32",00000000) ret=42aa3dcd 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42aa3dcd 000b:Call user32.UnregisterClassW(0033fb74 L"NativeFontCtl",00000000) ret=42aaa63d 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42aaa63d 000b:Call user32.UnregisterClassW(0033fb7e L"SysPager",00000000) ret=42aaa9bf 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42aaa9bf 000b:Call user32.UnregisterClassW(0033fb6c L"msctls_progress32",00000000) ret=42aada75 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42aada75 000b:Call user32.UnregisterClassW(0033fb74 L"ReBarWindow32",00000000) ret=42ab6f6d 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42ab6f6d 000b:Call user32.UnregisterClassW(0033fb6a L"msctls_statusbar32",00000000) ret=42ac029b 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42ac029b 000b:Call user32.UnregisterClassW(0033fb80 L"SysLink",00000000) ret=42ac5739 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42ac5739 000b:Call user32.UnregisterClassW(0033fb70 L"SysTabControl32",00000000) ret=42ac82d9 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42ac82d9 000b:Call user32.UnregisterClassW(0033fb70 L"ToolbarWindow32",00000000) ret=42ad2489 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42ad2489 000b:Call user32.DestroyIcon(00010032) ret=42ae196b 000b:Ret user32.DestroyIcon() retval=00000001 ret=42ae196b 000b:Call user32.DestroyIcon(00010034) ret=42ae196b 000b:Ret user32.DestroyIcon() retval=00000001 ret=42ae196b 000b:Call user32.DestroyIcon(00010036) ret=42ae196b 000b:Ret user32.DestroyIcon() retval=00000001 ret=42ae196b 000b:Call user32.UnregisterClassW(0033fb5e L"tooltips_class32",00000000) ret=42ae19ee 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42ae19ee 000b:Call user32.UnregisterClassW(0033fb6c L"msctls_trackbar32",00000000) ret=42ae6ae5 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42ae6ae5 000b:Call user32.UnregisterClassW(0033fb74 L"SysTreeView32",00000000) ret=42aeae0d 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42aeae0d 000b:Call user32.UnregisterClassW(0033fb70 L"msctls_updown32",00000000) ret=42af6429 000b:Ret user32.UnregisterClassW() retval=00000001 ret=42af6429 000b:Call gdi32.DeleteObject(0000020c) ret=42a70554 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a70554 000b:Call gdi32.DeleteObject(00000204) ret=42a7056f 000b:Ret gdi32.DeleteObject() retval=00000001 ret=42a7056f 000b:Call KERNEL32.GlobalDeleteAtom(0000c015) ret=42a7058b 000b:Ret KERNEL32.GlobalDeleteAtom() retval=00000000 ret=42a7058b 000b:Ret PE DLL (proc=0x42af8af0,module=0x42a60000 L"comctl32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x43382540,module=0x43370000 L"uxtheme.dll",reason=PROCESS_DETACH,res=0x1) 000b:Ret PE DLL (proc=0x43382540,module=0x43370000 L"uxtheme.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x407c6b50,module=0x40790000 L"shlwapi.dll",reason=PROCESS_DETACH,res=0x1) 000b:Call KERNEL32.TlsFree(00000002) ret=407b881a 000b:Ret KERNEL32.TlsFree() retval=00000001 ret=407b881a 000b:Ret PE DLL (proc=0x407c6b50,module=0x40790000 L"shlwapi.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x4290f0c0,module=0x42870000 L"user32.dll",reason=PROCESS_DETACH,res=0x1) 000b:Ret PE DLL (proc=0x4290f0c0,module=0x42870000 L"user32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x4316a1e0,module=0x43100000 L"winex11.drv",reason=PROCESS_DETACH,res=0x1) 000b:Ret PE DLL (proc=0x4316a1e0,module=0x43100000 L"winex11.drv",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x4332ebb0,module=0x43320000 L"imm32.dll",reason=PROCESS_DETACH,res=0x1) 000b:Call KERNEL32.TlsFree(00000000) ret=433299fa 000b:Ret KERNEL32.TlsFree() retval=00000001 ret=433299fa 000b:Ret PE DLL (proc=0x4332ebb0,module=0x43320000 L"imm32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x42a17de0,module=0x429c0000 L"gdi32.dll",reason=PROCESS_DETACH,res=0x1) 000b:Ret PE DLL (proc=0x42a17de0,module=0x429c0000 L"gdi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x405c8c90,module=0x40590000 L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) 000b:Ret PE DLL (proc=0x405c8c90,module=0x40590000 L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_DETACH,res=0x1) 000b:Ret PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000b:Call PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) 000b:Ret PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Ret gdi32.DeleteDC() retval=00000001 ret=42a83a9e 000d:Call gdi32.DeleteDC(000002dc) ret=42a83ab0 000d:Ret gdi32.DeleteDC() retval=00000001 ret=42a83ab0 000d:Call gdi32.DeleteObject(000002f8) ret=42a83ac2 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a83ac2 000d:Call gdi32.DeleteObject(00000304) ret=42a83ad4 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a83ad4 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140ce8) ret=42a83b01 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a83b01 000d:Call ntdll.RtlFreeHeap(00110000,00000000,00140700) ret=42a83b21 000d:Ret ntdll.RtlFreeHeap() retval=00000001 ret=42a83b21 000d:Ret comctl32.ImageList_Destroy() retval=00000001 ret=426863cd 000d:Call ntdll.RtlDeleteCriticalSection(426f0614) ret=426863e9 000d:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=426863e9 000d:Call ntdll.RtlDeleteCriticalSection(426f04d8) ret=426767c8 000d:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=426767c8 000d:Ret PE DLL (proc=0x426d9ab0,module=0x42660000 L"shell32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x42c35760,module=0x42b60000 L"ole32.dll",reason=PROCESS_DETACH,res=0x1) 000d:Call user32.UnregisterClassW(42c42d20 L"OleMainThreadWndClass 0x######## ",42b60000) ret=42b816cb 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42b816cb 000d:Ret PE DLL (proc=0x42c35760,module=0x42b60000 L"ole32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x42ce72f0,module=0x42ca0000 L"rpcrt4.dll",reason=PROCESS_DETACH,res=0x1) 000d:Ret PE DLL (proc=0x42ce72f0,module=0x42ca0000 L"rpcrt4.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x42af8af0,module=0x42a60000 L"comctl32.dll",reason=PROCESS_DETACH,res=0x1) 000d:Call user32.UnregisterClassW(0033fb76 L"SysAnimate32",00000000) ret=42a630c7 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42a630c7 000d:Call user32.UnregisterClassW(0033fb76 L"ComboBoxEx32",00000000) ret=42a65ce7 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42a65ce7 000d:Call user32.UnregisterClassW(0033fb6c L"SysDateTimePick32",00000000) ret=42a70cd5 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42a70cd5 000d:Call user32.UnregisterClassW(0033fb72 L"flatsb_class32",00000000) ret=42a78033 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42a78033 000d:Call user32.UnregisterClassW(0033fb78 L"SysHeader32",00000000) ret=42a78811 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42a78811 000d:Call user32.UnregisterClassW(0033fb70 L"msctls_hotkey32",00000000) ret=42a7d1c9 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42a7d1c9 000d:Call user32.UnregisterClassW(0033fb72 L"SysIPAddress32",00000000) ret=42a86d03 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42a86d03 000d:Call user32.UnregisterClassW(0033fb74 L"SysListView32",00000000) ret=42a888dd 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42a888dd 000d:Call user32.UnregisterClassW(0033fb74 L"SysMonthCal32",00000000) ret=42aa3dcd 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42aa3dcd 000d:Call user32.UnregisterClassW(0033fb74 L"NativeFontCtl",00000000) ret=42aaa63d 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42aaa63d 000d:Call user32.UnregisterClassW(0033fb7e L"SysPager",00000000) ret=42aaa9bf 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42aaa9bf 000d:Call user32.UnregisterClassW(0033fb6c L"msctls_progress32",00000000) ret=42aada75 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42aada75 000d:Call user32.UnregisterClassW(0033fb74 L"ReBarWindow32",00000000) ret=42ab6f6d 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42ab6f6d 000d:Call user32.UnregisterClassW(0033fb6a L"msctls_statusbar32",00000000) ret=42ac029b 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42ac029b 000d:Call user32.UnregisterClassW(0033fb80 L"SysLink",00000000) ret=42ac5739 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42ac5739 000d:Call user32.UnregisterClassW(0033fb70 L"SysTabControl32",00000000) ret=42ac82d9 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42ac82d9 000d:Call user32.UnregisterClassW(0033fb70 L"ToolbarWindow32",00000000) ret=42ad2489 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42ad2489 000d:Call user32.DestroyIcon(00010024) ret=42ae196b 000d:Ret user32.DestroyIcon() retval=00000001 ret=42ae196b 000d:Call user32.DestroyIcon(00010026) ret=42ae196b 000d:Ret user32.DestroyIcon() retval=00000001 ret=42ae196b 000d:Call user32.DestroyIcon(00010028) ret=42ae196b 000d:Ret user32.DestroyIcon() retval=00000001 ret=42ae196b 000d:Call user32.UnregisterClassW(0033fb5e L"tooltips_class32",00000000) ret=42ae19ee 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42ae19ee 000d:Call user32.UnregisterClassW(0033fb6c L"msctls_trackbar32",00000000) ret=42ae6ae5 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42ae6ae5 000d:Call user32.UnregisterClassW(0033fb74 L"SysTreeView32",00000000) ret=42aeae0d 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42aeae0d 000d:Call user32.UnregisterClassW(0033fb70 L"msctls_updown32",00000000) ret=42af6429 000d:Ret user32.UnregisterClassW() retval=00000001 ret=42af6429 000d:Call gdi32.DeleteObject(0000020c) ret=42a70554 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a70554 000d:Call gdi32.DeleteObject(00000204) ret=42a7056f 000d:Ret gdi32.DeleteObject() retval=00000001 ret=42a7056f 000d:Call KERNEL32.GlobalDeleteAtom(0000c015) ret=42a7058b 000d:Ret KERNEL32.GlobalDeleteAtom() retval=00000000 ret=42a7058b 000d:Ret PE DLL (proc=0x42af8af0,module=0x42a60000 L"comctl32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x43543540,module=0x43530000 L"uxtheme.dll",reason=PROCESS_DETACH,res=0x1) 000d:Ret PE DLL (proc=0x43543540,module=0x43530000 L"uxtheme.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x405c6b50,module=0x40590000 L"shlwapi.dll",reason=PROCESS_DETACH,res=0x1) 000d:Call KERNEL32.TlsFree(00000002) ret=405b881a 000d:Ret KERNEL32.TlsFree() retval=00000001 ret=405b881a 000d:Ret PE DLL (proc=0x405c6b50,module=0x40590000 L"shlwapi.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x4290f0c0,module=0x42870000 L"user32.dll",reason=PROCESS_DETACH,res=0x1) 000d:Ret PE DLL (proc=0x4290f0c0,module=0x42870000 L"user32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x4332b1e0,module=0x432c0000 L"winex11.drv",reason=PROCESS_DETACH,res=0x1) 000d:Ret PE DLL (proc=0x4332b1e0,module=0x432c0000 L"winex11.drv",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x434efbb0,module=0x434e0000 L"imm32.dll",reason=PROCESS_DETACH,res=0x1) 000d:Call KERNEL32.TlsFree(00000000) ret=434ea9fa 000d:Ret KERNEL32.TlsFree() retval=00000001 ret=434ea9fa 000d:Ret PE DLL (proc=0x434efbb0,module=0x434e0000 L"imm32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x42a17de0,module=0x429c0000 L"gdi32.dll",reason=PROCESS_DETACH,res=0x1) 000d:Ret PE DLL (proc=0x42a17de0,module=0x429c0000 L"gdi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x407c8c90,module=0x40790000 L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) 000d:Ret PE DLL (proc=0x407c8c90,module=0x40790000 L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_DETACH,res=0x1) 000d:Ret PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000d:Call PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) 000d:Ret PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Ret PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Ret PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x426a0c90,module=0x42660000 L"advapi32.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Ret PE DLL (proc=0x426a0c90,module=0x42660000 L"advapi32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x407b7de0,module=0x40760000 L"gdi32.dll",reason=PROCESS_ATTACH,res=0x1) 0018:Ret PE DLL (proc=0x407b9de0,module=0x40760000 L"gdi32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 0018:Call PE DLL (proc=0x428ab0c0,module=0x42810000 L"user32.dll",reason=PROCESS_ATTACH,res=0x0) 0018:Call PE DLL (proc=0x42f82bb0,module=0x42f70000 L"imm32.dll",reason=PROCESS_ATTACH,res=0x0) 0018:Call user32.RegisterWindowMessageA(42f83250 "MSIMEService") ret=42f7da8e 0018:Ret user32.RegisterWindowMessageA() retval=0000c000 ret=42f7da8e 0018:Call user32.RegisterWindowMessageA(42f8325d "MSIMEReconvertOptions") ret=42f7daa5 0018:Ret user32.RegisterWindowMessageA() retval=0000c001 ret=42f7daa5 0018:Call user32.RegisterWindowMessageA(42f83273 "MSIMEMouseOperation") ret=42f7dabc 0018:Ret user32.RegisterWindowMessageA() retval=0000c002 ret=42f7dabc 0018:Call user32.RegisterWindowMessageA(42f83287 "MSIMEReconvertRequest") ret=42f7dad3 0018:Ret user32.RegisterWindowMessageA() retval=0000c003 ret=42f7dad3 0018:Call user32.RegisterWindowMessageA(42f8329d "MSIMEReconvert") ret=42f7daea 0018:Ret user32.RegisterWindowMessageA() retval=0000c004 ret=42f7daea 0018:Call user32.RegisterWindowMessageA(42f832ac "MSIMEQueryPosition") ret=42f7db01 0018:Ret user32.RegisterWindowMessageA() retval=0000c005 ret=42f7db01 0018:Call user32.RegisterWindowMessageA(42f832bf "MSIMEDocumentFeed") ret=42f7db18 0018:Ret user32.RegisterWindowMessageA() retval=0000c006 ret=42f7db18 0018:Call KERNEL32.TlsAlloc() ret=42f7db26 0018:Ret KERNEL32.TlsAlloc() retval=00000000 ret=42f7db26 0018:Ret PE DLL (proc=0x42f82bb0,module=0x42f70000 L"imm32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 0018:Call PE DLL (proc=0x42dcc1e0,module=0x42d60000 L"winex11.drv",reason=PROCESS_ATTACH,res=0x0) 0018:Ret PE DLL (proc=0x42dcc1e0,module=0x42d60000 L"winex11.drv",reason=PROCESS_ATTACH,res=0x0) retval=1 0018:Ret PE DLL (proc=0x428ab0c0,module=0x42810000 L"user32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 0018:Ret KERNEL32.LoadLibraryA() retval=42810000 ret=401daceb 0018:Call KERNEL32.GetProcAddress(42810000,401dc677 "BroadcastSystemMessageW") ret=401dacbc 0018:Ret KERNEL32.GetProcAddress() retval=428126c4 ret=401dacbc 0018:Call user32.BroadcastSystemMessageW(00000021,00000000,00000219,00008000,0063e41c) ret=401d7a84 0018:Ret user32.BroadcastSystemMessageW() retval=00000001 ret=401d7a84 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,00000023) ret=401d75d1 0018:Ret ntdll.RtlAllocateHeap() retval=001373a0 ret=401d75d1 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,00000023) ret=401d75d1 0018:Ret ntdll.RtlAllocateHeap() retval=001373d0 ret=401d75d1 0018:Call ntdll.RtlFreeHeap(00110000,00000000,001373d0) ret=401d8caf 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d8caf 0018:Call advapi32.RegDeleteValueW(00000048,0011b174 L"\\DosDevices\\D:") ret=401d9fbd 0018:Ret advapi32.RegDeleteValueW() retval=00000000 ret=401d9fbd 0018:Call ntoskrnl.exe.IoDeleteSymbolicLink(0011b164) ret=401d9fcb 0018:Call ntdll.NtOpenSymbolicLinkObject(0063e31c,00000000,0063e304) ret=40690c61 0018:Ret ntdll.NtOpenSymbolicLinkObject() retval=00000000 ret=40690c61 0018:Call ntdll.NtClose(000000a0) ret=40690ca9 0018:Ret ntdll.NtClose() retval=00000000 ret=40690ca9 0018:Ret ntoskrnl.exe.IoDeleteSymbolicLink() retval=00000000 ret=401d9fcb 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b1d0) ret=401d9fef 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9fef 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b150) ret=401da00f 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401da00f 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011aef0) ret=401d7a1a 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7a1a 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=401d846e 0018:Ret ntdll.RtlAllocateHeap() retval=0011aef0 ret=401d846e 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401d7d1b 0018:Ret ntdll.RtlAllocateHeap() retval=0011b1d0 ret=401d7d1b 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b070) ret=401d7fc1 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fc1 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b088) ret=401d7fe8 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fe8 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000c) ret=401d7d1b 0018:Ret ntdll.RtlAllocateHeap() retval=00136718 ret=401d7d1b 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401d7d1b 0018:Ret ntdll.RtlAllocateHeap() retval=0011b070 ret=401d7d1b 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,00000060) ret=401da9d9 0018:Ret ntdll.RtlAllocateHeap() retval=0011b150 ret=401da9d9 0018:Call ntdll.RtlInitUnicodeString(0011b164,0011b174 L"\\DosDevices\\D:") ret=401daa27 0018:Ret ntdll.RtlInitUnicodeString() retval=0000001c ret=401daa27 0018:Call ntoskrnl.exe.IoCreateSymbolicLink(0011b164,0011b040) ret=401daacc 0018:Call ntdll.NtCreateSymbolicLinkObject(0063e25c,000f0001,0063e244,0011b040) ret=40691303 0018:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0018:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b1b8) ret=401d9e8c 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0018:Call ntdll.RtlAllocateHeap(00110000,00000008,0000000e) ret=401d9ebb 0018:Ret ntdll.RtlAllocateHeap() retval=0011b1b8 ret=401d9ebb 0018:Call advapi32.RegSetValueExW(00000048,0011b0c4 L"\\??\\Volume{00000000-0000-0000-0000-000000000044}",00000000,00000003,0011b1b8,0000000e) ret=401d9f0b 0018:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0018:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0018:Call ntdll.RtlAllocateHeap(00110000,00000008,0000000e) ret=401d9ebb 0018:Ret ntdll.RtlAllocateHeap() retval=001373d0 ret=401d9ebb 0018:Call advapi32.RegSetValueExW(00000048,0011b174 L"\\DosDevices\\D:",00000000,00000003,001373d0,0000000e) ret=401d9f0b 0018:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0018:Call advapi32.RegCreateKeyW(80000002,401db340 L"Software\\Wine\\Drives",0063e578) ret=401d89d0 0018:Ret advapi32.RegCreateKeyW() retval=00000000 ret=401d89d0 0018:Call advapi32.RegSetValueExW(000000a8,0063e510 L"d:",00000000,00000001,401db3c0,0000000c) ret=401d8ace 0018:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d8ace 0018:Call advapi32.RegCloseKey(000000a8) ret=401d8a3d 0018:Ret advapi32.RegCloseKey() retval=00000000 ret=401d8a3d 0018:Call ntdll.RtlFreeHeap(00110000,00000000,001373a0) ret=401d8879 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d8879 0018:Call user32.BroadcastSystemMessageW(00000021,00000000,00000219,00008000,0063e41c) ret=401d7a84 0018:Ret user32.BroadcastSystemMessageW() retval=00000001 ret=401d7a84 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401d7d1b 0018:Ret ntdll.RtlAllocateHeap() retval=001373a0 ret=401d7d1b 0018:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d7fc1 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fc1 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b808) ret=401d7fe8 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d7fe8 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,0000000e) ret=401d7d1b 0018:Ret ntdll.RtlAllocateHeap() retval=0011b808 ret=401d7d1b 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,00000002) ret=401d7d1b 0018:Ret ntdll.RtlAllocateHeap() retval=001373e8 ret=401d7d1b 0018:Call advapi32.RegDeleteValueW(00000048,0011b844 L"\\??\\Volume{00000000-0000-0000-0000-00000000005a}") ret=401d9fbd 0018:Ret advapi32.RegDeleteValueW() retval=00000000 ret=401d9fbd 0018:Call ntoskrnl.exe.IoDeleteSymbolicLink(0011b834) ret=401d9fcb 0018:Call ntdll.NtOpenSymbolicLinkObject(0063e3fc,00000000,0063e3e4) ret=40690c61 0018:Ret ntdll.NtOpenSymbolicLinkObject() retval=00000000 ret=40690c61 0018:Call ntdll.NtClose(000000a8) ret=40690ca9 0018:Ret ntdll.NtClose() retval=00000000 ret=40690ca9 0018:Ret ntoskrnl.exe.IoDeleteSymbolicLink() retval=00000000 ret=401d9fcb 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b960) ret=401d9fef 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9fef 0018:Call ntdll.RtlFreeHeap(00110000,00000000,0011b820) ret=401da00f 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401da00f 0018:Call ntdll.RtlAllocateHeap(00110000,00000000,000000b6) ret=401da9d9 0018:Ret ntdll.RtlAllocateHeap() retval=0011b820 ret=401da9d9 0018:Call ntdll.RtlInitUnicodeString(0011b834,0011b844 L"\\??\\Volume{496133e1-a4cd-7236-ac6d-46789df0e1b2}") ret=401daa27 0018:Ret ntdll.RtlInitUnicodeString() retval=00000060 ret=401daa27 0018:Call ntoskrnl.exe.IoCreateSymbolicLink(0011b834,0011b7d8) ret=401daacc 0018:Call ntdll.NtCreateSymbolicLinkObject(0063e27c,000f0001,0063e264,0011b7d8) ret=40691303 0018:Ret ntdll.NtCreateSymbolicLinkObject() retval=00000000 ret=40691303 0018:Ret ntoskrnl.exe.IoCreateSymbolicLink() retval=00000000 ret=401daacc 0018:Call ntdll.RtlFreeHeap(00110000,00000000,00000000) ret=401d9e8c 0018:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401d9e8c 0018:Call ntdll.RtlAllocateHeap(00110000,00000008,00000004) ret=401d9ebb 0018:Ret ntdll.RtlAllocateHeap() retval=0011b960 ret=401d9ebb 0018:Call advapi32.RegSetValueExW(00000048,0011b844 L"\\??\\Volume{496133e1-a4cd-7236-ac6d-46789df0e1b2}",00000000,00000003,0011b960,00000004) ret=401d9f0b 0018:Ret advapi32.RegSetValueExW() retval=00000000 ret=401d9f0b 0009:Ret PE DLL (proc=0x407b7de0,module=0x40760000 L"gdi32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x406af0c0,module=0x40610000 L"user32.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call PE DLL (proc=0x4358fbb0,module=0x43580000 L"imm32.dll",reason=PROCESS_ATTACH,res=0x0) 0009:Call user32.RegisterWindowMessageA(43590250 "MSIMEService") ret=4358aa8e 0009:Ret user32.RegisterWindowMessageA() retval=0000c000 ret=4358aa8e 0009:Call user32.RegisterWindowMessageA(4359025d "MSIMEReconvertOptions") ret=4358aaa5 0009:Ret user32.RegisterWindowMessageA() retval=0000c001 ret=4358aaa5 0009:Call user32.RegisterWindowMessageA(43590273 "MSIMEMouseOperation") ret=4358aabc 0009:Ret user32.RegisterWindowMessageA() retval=0000c002 ret=4358aabc 0009:Call user32.RegisterWindowMessageA(43590287 "MSIMEReconvertRequest") ret=4358aad3 0009:Ret user32.RegisterWindowMessageA() retval=0000c003 ret=4358aad3 0009:Call user32.RegisterWindowMessageA(4359029d "MSIMEReconvert") ret=4358aaea 0009:Ret user32.RegisterWindowMessageA() retval=0000c004 ret=4358aaea 0009:Call user32.RegisterWindowMessageA(435902ac "MSIMEQueryPosition") ret=4358ab01 0009:Ret user32.RegisterWindowMessageA() retval=0000c005 ret=4358ab01 0009:Call user32.RegisterWindowMessageA(435902bf "MSIMEDocumentFeed") ret=4358ab18 0009:Ret user32.RegisterWindowMessageA() retval=0000c006 ret=4358ab18 0009:Call KERNEL32.TlsAlloc() ret=4358ab26 0009:Ret KERNEL32.TlsAlloc() retval=00000000 ret=4358ab26 0009:Ret PE DLL (proc=0x4358fbb0,module=0x43580000 L"imm32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 0009:Call PE DLL (proc=0x433cb1e0,module=0x43360000 L"winex11.drv",reason=PROCESS_ATTACH,res=0x0) 0009:Ret PE DLL (proc=0x433cb1e0,module=0x43360000 L"winex11.drv",reason=PROCESS_ATTACH,res=0x0) retval=1 0009:Ret PE DLL (proc=0x406af0c0,module=0x40610000 L"user32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x42914b50,module=0x428e0000 L"shlwapi.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call KERNEL32.DisableThreadLibraryCalls(428e0000) ret=4290684b 0009:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=4290684b 0009:Call KERNEL32.TlsAlloc() ret=42906859 0009:Ret KERNEL32.TlsAlloc() retval=00000002 ret=42906859 0009:Ret PE DLL (proc=0x42914b50,module=0x428e0000 L"shlwapi.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x429f5af0,module=0x42950000 L"comctl32.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call KERNEL32.DisableThreadLibraryCalls(42950000) ret=4296d5db 0009:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=4296d5db 0009:Call KERNEL32.GlobalAddAtomW(42a034c0 L"CC32SubclassInfo") ret=4296d5f2 0009:Ret KERNEL32.GlobalAddAtomW() retval=0000c015 ret=4296d5f2 0009:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42a034e2) ret=4296d639 0009:Ret gdi32.CreateBitmap() retval=00000204 ret=4296d639 0009:Call gdi32.CreatePatternBrush(00000204) ret=4296d64a 0009:Ret gdi32.CreatePatternBrush() retval=0000020c ret=4296d64a 0009:Call user32.GetSysColor(00000014) ret=4296b53a 0009:Ret user32.GetSysColor() retval=00ffffff ret=4296b53a 0009:Call user32.GetSysColor(00000010) ret=4296b551 0009:Ret user32.GetSysColor() retval=00808080 ret=4296b551 0009:Call user32.GetSysColor(00000012) ret=4296b563 0009:Ret user32.GetSysColor() retval=00000000 ret=4296b563 0009:Call user32.GetSysColor(0000000f) ret=4296b575 0009:Ret user32.GetSysColor() retval=00c8d0d4 ret=4296b575 0009:Call user32.GetSysColor(0000000d) ret=4296b587 0009:Ret user32.GetSysColor() retval=006a240a ret=4296b587 0009:Call user32.GetSysColor(0000000e) ret=4296b599 0009:Ret user32.GetSysColor() retval=00ffffff ret=4296b599 0009:Call user32.GetSysColor(0000001a) ret=4296b5ab 0009:Ret user32.GetSysColor() retval=00800000 ret=4296b5ab 0009:Call user32.GetSysColor(00000014) ret=4296b5bd 0009:Ret user32.GetSysColor() retval=00ffffff ret=4296b5bd 0009:Call user32.GetSysColor(00000010) ret=4296b5cf 0009:Ret user32.GetSysColor() retval=00808080 ret=4296b5cf 0009:Call user32.GetSysColor(00000015) ret=4296b5e1 0009:Ret user32.GetSysColor() retval=00404040 ret=4296b5e1 0009:Call user32.GetSysColor(0000000f) ret=4296b5f3 0009:Ret user32.GetSysColor() retval=00c8d0d4 ret=4296b5f3 0009:Call user32.GetSysColor(00000005) ret=4296b605 0009:Ret user32.GetSysColor() retval=00ffffff ret=4296b605 0009:Call user32.GetSysColor(00000008) ret=4296b617 0009:Ret user32.GetSysColor() retval=00000000 ret=4296b617 0009:Call user32.GetSysColor(00000011) ret=4296b629 0009:Ret user32.GetSysColor() retval=00808080 ret=4296b629 0009:Call user32.GetSysColor(00000002) ret=4296b63b 0009:Ret user32.GetSysColor() retval=006a240a ret=4296b63b 0009:Call user32.GetSysColor(00000018) ret=4296b64d 0009:Ret user32.GetSysColor() retval=00e1ffff ret=4296b64d 0009:Call user32.GetSysColor(00000017) ret=4296b65f 0009:Ret user32.GetSysColor() retval=00000000 ret=4296b65f 0009:Call user32.LoadCursorW(00000000,00007f00) ret=42960126 0009:Ret user32.LoadCursorW() retval=00020022 ret=42960126 0009:Call user32.RegisterClassW(0032fc4c) ret=4296018f 0009:Ret user32.RegisterClassW() retval=0000c016 ret=4296018f 0009:Call user32.LoadCursorW(00000000,00007f00) ret=42962d46 0009:Ret user32.LoadCursorW() retval=00020022 ret=42962d46 0009:Call user32.RegisterClassW(0032fc4c) ret=42962daf 0009:Ret user32.RegisterClassW() retval=0000c017 ret=42962daf 0009:Call user32.LoadCursorW(00000000,00007f00) ret=4296dd36 0009:Ret user32.LoadCursorW() retval=00020022 ret=4296dd36 0009:Call user32.RegisterClassW(0032fc44) ret=4296ddbd 0009:Ret user32.RegisterClassW() retval=0000c018 ret=4296ddbd 0009:Call user32.LoadCursorW(00000000,00007f00) ret=42975096 0009:Ret user32.LoadCursorW() retval=00020022 ret=42975096 0009:Call user32.RegisterClassW(0032fc48) ret=4297510b 0009:Ret user32.RegisterClassW() retval=0000c019 ret=4297510b 0009:Call user32.LoadCursorW(00000000,00007f00) ret=42975876 0009:Ret user32.LoadCursorW() retval=00020022 ret=42975876 0009:Call user32.RegisterClassW(0032fc50) ret=429758d2 0009:Ret user32.RegisterClassW() retval=0000c01a ret=429758d2 0009:Call user32.RegisterClassW(0032fc58) ret=4297a287 0009:Ret user32.RegisterClassW() retval=0000c01b ret=4297a287 0009:Call user32.LoadCursorW(00000000,00007f01) ret=42983d66 0009:Ret user32.LoadCursorW() retval=00020020 ret=42983d66 0009:Call user32.RegisterClassW(0032fc48) ret=42983ddb 0009:Ret user32.RegisterClassW() retval=0000c01c ret=42983ddb 0009:Call user32.LoadCursorW(00000000,00007f00) ret=42985946 0009:Ret user32.LoadCursorW() retval=00020022 ret=42985946 0009:Call user32.RegisterClassW(0032fc4c) ret=429859b5 0009:Ret user32.RegisterClassW() retval=0000c01d ret=429859b5 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429a0e36 0009:Ret user32.LoadCursorW() retval=00020022 ret=429a0e36 0009:Call user32.RegisterClassW(0032fc4c) ret=429a0ea5 0009:Ret user32.RegisterClassW() retval=0000c01e ret=429a0ea5 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429a76a6 0009:Ret user32.LoadCursorW() retval=00020022 ret=429a76a6 0009:Call user32.RegisterClassW(0032fc4c) ret=429a7715 0009:Ret user32.RegisterClassW() retval=0000c01f ret=429a7715 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429a7a26 0009:Ret user32.LoadCursorW() retval=00020022 ret=429a7a26 0009:Call user32.RegisterClassW(0032fc54) ret=429a7a77 0009:Ret user32.RegisterClassW() retval=0000c020 ret=429a7a77 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429aaad6 0009:Ret user32.LoadCursorW() retval=00020022 ret=429aaad6 0009:Call user32.RegisterClassW(0032fc44) ret=429aab56 0009:Ret user32.RegisterClassW() retval=0000c021 ret=429aab56 0009:Call user32.RegisterClassW(0032fc5c) ret=429b402b 0009:Ret user32.RegisterClassW() retval=0000c022 ret=429b402b 0009:Call user32.GetSystemMetrics(00000044) ret=429b403a 0009:Ret user32.GetSystemMetrics() retval=00000004 ret=429b403a 0009:Call user32.GetSystemMetrics(00000045) ret=429b404f 0009:Ret user32.GetSystemMetrics() retval=00000004 ret=429b404f 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429bd2f0 0009:Ret user32.LoadCursorW() retval=00020022 ret=429bd2f0 0009:Call user32.RegisterClassW(0032fc40) ret=429bd37d 0009:Ret user32.RegisterClassW() retval=0000c023 ret=429bd37d 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429c2796 0009:Ret user32.LoadCursorW() retval=00020022 ret=429c2796 0009:Call user32.RegisterClassW(0032fc58) ret=429c27da 0009:Ret user32.RegisterClassW() retval=0000c024 ret=429c27da 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429c5336 0009:Ret user32.LoadCursorW() retval=00020022 ret=429c5336 0009:Call user32.RegisterClassW(0032fc48) ret=429c53b1 0009:Ret user32.RegisterClassW() retval=0000c025 ret=429c53b1 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429cf4e6 0009:Ret user32.LoadCursorW() retval=00020022 ret=429cf4e6 0009:Call user32.RegisterClassW(0032fc48) ret=429cf561 0009:Ret user32.RegisterClassW() retval=0000c026 ret=429cf561 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429dea50 0009:Ret user32.LoadCursorW() retval=00020022 ret=429dea50 0009:Call user32.RegisterClassW(0032fc44) ret=429dead1 0009:Ret user32.RegisterClassW() retval=0000c027 ret=429dead1 0009:Call user32.LoadImageW(42950000,00000016,00000001,00000000,00000000,00000000) ret=429deb1c 0009:Ret user32.LoadImageW() retval=00020028 ret=429deb1c 0009:Call user32.LoadImageW(42950000,00000019,00000001,00000000,00000000,00000000) ret=429deb54 0009:Ret user32.LoadImageW() retval=00020026 ret=429deb54 0009:Call user32.LoadImageW(42950000,0000001c,00000001,00000000,00000000,00000000) ret=429deb8c 0009:Ret user32.LoadImageW() retval=00020024 ret=429deb8c 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429e3b46 0009:Ret user32.LoadCursorW() retval=00020022 ret=429e3b46 0009:Call user32.RegisterClassW(0032fc44) ret=429e3bcd 0009:Ret user32.RegisterClassW() retval=0000c028 ret=429e3bcd 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429e7ea3 0009:Ret user32.LoadCursorW() retval=00020022 ret=429e7ea3 0009:Call user32.RegisterClassW(0032fc4c) ret=429e7f12 0009:Ret user32.RegisterClassW() retval=0000c029 ret=429e7f12 0009:Call user32.LoadCursorW(00000000,00007f00) ret=429f3486 0009:Ret user32.LoadCursorW() retval=00020022 ret=429f3486 0009:Call user32.RegisterClassW(0032fc48) ret=429f3501 0009:Ret user32.RegisterClassW() retval=0000c02a ret=429f3501 0009:Call KERNEL32.LoadLibraryA(42a0b156 "uxtheme.dll") ret=429f5aab 0009:Call PE DLL (proc=0x435e5540,module=0x435d0000 L"uxtheme.dll",reason=PROCESS_ATTACH,res=0x0) 0009:Call KERNEL32.DisableThreadLibraryCalls(435d0000) ret=435dd9de 0009:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=435dd9de 0009:Call KERNEL32.GlobalAddAtomW(435f3f8a L"ux_theme") ret=435e36c8 0009:Ret KERNEL32.GlobalAddAtomW() retval=0000c02b ret=435e36c8 0009:Call KERNEL32.GlobalAddAtomW(435f3f76 L"ux_subapp") ret=435e36e0 0009:Ret KERNEL32.GlobalAddAtomW() retval=0000c02c ret=435e36e0 0009:Call KERNEL32.GlobalAddAtomW(435f3f5e L"ux_subidlst") ret=435e36f8 0009:Ret KERNEL32.GlobalAddAtomW() retval=0000c02d ret=435e36f8 0009:Call KERNEL32.GlobalAddAtomW(435f3f40 L"ux_dialogtheme") ret=435e3710 0009:Ret KERNEL32.GlobalAddAtomW() retval=0000c02e ret=435e3710 0009:Call advapi32.RegOpenKeyW(80000001,435f3dc0 L"Software\\Microsoft\\Windows\\CurrentVersion\\ThemeManager",0032f548) ret=435e3739 0009:Ret advapi32.RegOpenKeyW() retval=00000002 ret=435e3739 0009:Ret PE DLL (proc=0x435e5540,module=0x435d0000 L"uxtheme.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 0009:Ret KERNEL32.LoadLibraryA() retval=435d0000 ret=429f5aab 0009:Call KERNEL32.GetProcAddress(435d0000,42a0b282 "IsThemeActive") ret=429f5a7c 0009:Ret KERNEL32.GetProcAddress() retval=435d5aa8 ret=429f5a7c 0009:Call uxtheme.IsThemeActive() ret=429cf087 0009:Ret uxtheme.IsThemeActive() retval=00000000 ret=429cf087 0009:Ret PE DLL (proc=0x429f5af0,module=0x42950000 L"comctl32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x42745ab0,module=0x426d0000 L"shell32.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call KERNEL32.DisableThreadLibraryCalls(426d0000) ret=426fc0d1 0009:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=426fc0d1 0009:Call KERNEL32.GetModuleFileNameW(426d0000,428991e0,00000104) ret=426fc0ee 0009:Ret KERNEL32.GetModuleFileNameW() retval=0000001f ret=426fc0ee 0009:Call comctl32.InitCommonControlsEx(00000000) ret=426fc106 0009:Ret comctl32.InitCommonControlsEx() retval=00000000 ret=426fc106 0009:Call user32.GetSystemMetrics(00000031) ret=426f2451 0009:Ret user32.GetSystemMetrics() retval=00000010 ret=426f2451 0009:Call user32.GetSystemMetrics(00000032) ret=426f2462 0009:Ret user32.GetSystemMetrics() retval=00000010 ret=426f2462 0009:Call user32.GetSystemMetrics(0000000b) ret=426f2473 0009:Ret user32.GetSystemMetrics() retval=00000020 ret=426f2473 0009:Call user32.GetSystemMetrics(0000000c) ret=426f2485 0009:Ret user32.GetSystemMetrics() retval=00000020 ret=426f2485 0009:Call comctl32.328(00000010) ret=426f250c 0009:Call KERNEL32.LocalAlloc(00000040,00000014) ret=42969623 0009:Ret KERNEL32.LocalAlloc() retval=00141758 ret=42969623 0009:Call ntdll.RtlAllocateHeap(00110000,00000008,00000080) ret=42972848 0009:Ret ntdll.RtlAllocateHeap() retval=001418e8 ret=42972848 0009:Ret comctl32.328() retval=00141758 ret=426f250c 0009:Call comctl32.ImageList_Create(00000010,00000010,00000021,00000000,00000020) ret=426f2541 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008c) ret=4298163a 0009:Ret ntdll.RtlAllocateHeap() retval=00141970 ret=4298163a 0009:Call gdi32.CreateCompatibleDC(00000000) ret=429817a0 0009:Ret gdi32.CreateCompatibleDC() retval=00000298 ret=429817a0 0009:Call gdi32.CreateCompatibleDC(00000000) ret=42981974 0009:Ret gdi32.CreateCompatibleDC() retval=000002a4 ret=42981974 0009:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42969623 0009:Ret KERNEL32.LocalAlloc() retval=00141f58 ret=42969623 0009:Call gdi32.CreateDIBSection(00000298,00141f58,00000000,0032fb7c,00000000,00000000) ret=4297c5b7 0009:Ret gdi32.CreateDIBSection() retval=000002b0 ret=4297c5b7 0009:Call KERNEL32.LocalFree(00141f58) ret=4296936b 0009:Ret KERNEL32.LocalFree() retval=00000000 ret=4296936b 0009:Call gdi32.SelectObject(00000298,000002b0) ret=4298180f 0009:Ret gdi32.SelectObject() retval=0000006c ret=4298180f 0009:Call gdi32.CreateBitmap(00000040,00000010,00000001,00000001,00000000) ret=42981a0c 0009:Ret gdi32.CreateBitmap() retval=000002b4 ret=42981a0c 0009:Call gdi32.SelectObject(000002a4,000002b4) ret=42981a2b 0009:Ret gdi32.SelectObject() retval=0000006c ret=42981a2b 0009:Call ntdll.RtlAllocateHeap(00110000,00000008,00000001) ret=42981a5b 0009:Ret ntdll.RtlAllocateHeap() retval=00141f58 ret=42981a5b 0009:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42a035da) ret=42981871 0009:Ret gdi32.CreateBitmap() retval=000002b8 ret=42981871 0009:Call gdi32.CreatePatternBrush(000002b8) ret=42981881 0009:Ret gdi32.CreatePatternBrush() retval=000002c0 ret=42981881 0009:Call gdi32.DeleteObject(000002b8) ret=4298188f 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4298188f 0009:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42a035ca) ret=429818c0 0009:Ret gdi32.CreateBitmap() retval=000002c4 ret=429818c0 0009:Call gdi32.CreatePatternBrush(000002c4) ret=429818d0 0009:Ret gdi32.CreatePatternBrush() retval=000002cc ret=429818d0 0009:Call gdi32.DeleteObject(000002c4) ret=429818de 0009:Ret gdi32.DeleteObject() retval=00000001 ret=429818de 0009:Ret comctl32.ImageList_Create() retval=00141970 ret=426f2541 0009:Call comctl32.ImageList_Create(00000020,00000020,00000021,00000000,00000020) ret=426f2576 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,0000008c) ret=4298163a 0009:Ret ntdll.RtlAllocateHeap() retval=001433d0 ret=4298163a 0009:Call gdi32.CreateCompatibleDC(00000000) ret=429817a0 0009:Ret gdi32.CreateCompatibleDC() retval=000002d0 ret=429817a0 0009:Call gdi32.CreateCompatibleDC(00000000) ret=42981974 0009:Ret gdi32.CreateCompatibleDC() retval=000002dc ret=42981974 0009:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42969623 0009:Ret KERNEL32.LocalAlloc() retval=001439b8 ret=42969623 0009:Call gdi32.CreateDIBSection(000002d0,001439b8,00000000,0032fb7c,00000000,00000000) ret=4297c5b7 0009:Ret gdi32.CreateDIBSection() retval=000002e8 ret=4297c5b7 0009:Call KERNEL32.LocalFree(001439b8) ret=4296936b 0009:Ret KERNEL32.LocalFree() retval=00000000 ret=4296936b 0009:Call gdi32.SelectObject(000002d0,000002e8) ret=4298180f 0009:Ret gdi32.SelectObject() retval=0000006c ret=4298180f 0009:Call gdi32.CreateBitmap(00000080,00000020,00000001,00000001,00000000) ret=42981a0c 0009:Ret gdi32.CreateBitmap() retval=000002ec ret=42981a0c 0009:Call gdi32.SelectObject(000002dc,000002ec) ret=42981a2b 0009:Ret gdi32.SelectObject() retval=0000006c ret=42981a2b 0009:Call ntdll.RtlAllocateHeap(00110000,00000008,00000001) ret=42981a5b 0009:Ret ntdll.RtlAllocateHeap() retval=001439b8 ret=42981a5b 0009:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42a035da) ret=42981871 0009:Ret gdi32.CreateBitmap() retval=000002f0 ret=42981871 0009:Call gdi32.CreatePatternBrush(000002f0) ret=42981881 0009:Ret gdi32.CreatePatternBrush() retval=000002f8 ret=42981881 0009:Call gdi32.DeleteObject(000002f0) ret=4298188f 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4298188f 0009:Call gdi32.CreateBitmap(00000008,00000008,00000001,00000001,42a035ca) ret=429818c0 0009:Ret gdi32.CreateBitmap() retval=000002fc ret=429818c0 0009:Call gdi32.CreatePatternBrush(000002fc) ret=429818d0 0009:Ret gdi32.CreatePatternBrush() retval=00000304 ret=429818d0 0009:Call gdi32.DeleteObject(000002fc) ret=429818de 0009:Ret gdi32.DeleteObject() retval=00000001 ret=429818de 0009:Ret comctl32.ImageList_Create() retval=001433d0 ret=426f2576 0009:Call comctl32.ImageList_SetBkColor(00141970,ffffffff) ret=426f2599 0009:Ret comctl32.ImageList_SetBkColor() retval=ffffffff ret=426f2599 0009:Call comctl32.ImageList_SetBkColor(001433d0,ffffffff) ret=426f25b4 0009:Ret comctl32.ImageList_SetBkColor() retval=ffffffff ret=426f25b4 0009:Call user32.LoadImageA(426d0000,00000001,00000001,00000010,00000010,00008000) ret=426f25e7 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x406272cd ip=406272cd tid=0009 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=00350000 0009:trace:seh:raise_exception eax=9999cccc ebx=00000328 ecx=000000ac edx=00000067 esi=00000001 edi=00350000 0009:trace:seh:raise_exception ebp=0032f7c8 esp=0032f740 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010a02 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned ffffffff 0009:Ret user32.LoadImageA() retval=0002003a ret=426f25e7 0009:Call user32.LoadImageA(426d0000,00000001,00000001,00000020,00000020,00008000) ret=426f261c 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x406272cd ip=406272cd tid=0009 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=00360000 0009:trace:seh:raise_exception eax=00000000 ebx=0000034c ecx=00000000 edx=00000000 esi=00000001 edi=00360000 0009:trace:seh:raise_exception ebp=0032f7c8 esp=0032f740 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010246 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned ffffffff 0009:Ret user32.LoadImageA() retval=00020038 ret=426f261c 0009:Call KERNEL32.LoadLibraryA(42762834 "ole32.dll") ret=42745a6b 0009:Call PE DLL (proc=0x42be42f0,module=0x42b90000 L"rpcrt4.dll",reason=PROCESS_ATTACH,res=0x0) 0009:Ret PE DLL (proc=0x42be42f0,module=0x42b90000 L"rpcrt4.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 0009:Call PE DLL (proc=0x42b32760,module=0x42a60000 L"ole32.dll",reason=PROCESS_ATTACH,res=0x0) 0009:Call user32.RegisterClassW(0032f368) ret=42a7e84a 0009:Ret user32.RegisterClassW() retval=0000c02f ret=42a7e84a 0009:Ret PE DLL (proc=0x42b32760,module=0x42a60000 L"ole32.dll",reason=PROCESS_ATTACH,res=0x0) retval=1 0009:Ret KERNEL32.LoadLibraryA() retval=42a60000 ret=42745a6b 0009:Call KERNEL32.GetProcAddress(42a60000,427628b3 "CoTaskMemAlloc") ret=42745a3c 0009:Ret KERNEL32.GetProcAddress() retval=42a6bdd8 ret=42745a3c 0009:Call ole32.CoTaskMemAlloc(00000014) ret=427080ac 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42a99fa3 0009:Ret ntdll.RtlAllocateHeap() retval=001482e8 ret=42a99fa3 0009:Ret ole32.CoTaskMemAlloc() retval=001482e8 ret=427080ac 0009:Call KERNEL32.GetFullPathNameW(428991e0 L"C:\\windows\\system32\\shell32.dll",00000104,0032faa8,00000000) ret=426f16e6 0009:Ret KERNEL32.GetFullPathNameW() retval=0000001f ret=426f16e6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000040) ret=426f172e 0009:Ret ntdll.RtlAllocateHeap() retval=001490f0 ret=426f172e 0009:Call comctl32.334(00141758,00007fff,001482e8) ret=426f1791 0009:Ret comctl32.334() retval=00000000 ret=426f1791 0009:Call comctl32.ImageList_ReplaceIcon(00141970,ffffffff,0002003a) ret=426f17bd 0009:Call user32.CopyImage(0002003a,00000001,00000010,00000010,00004000) ret=4297dbfc 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x406272cd ip=406272cd tid=0009 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=00370000 0009:trace:seh:raise_exception eax=9999cccc ebx=00000370 ecx=000000ac edx=00000067 esi=00000001 edi=00370000 0009:trace:seh:raise_exception ebp=0032f5d8 esp=0032f550 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010a02 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned ffffffff 0009:Ret user32.CopyImage() retval=00020030 ret=4297dbfc 0009:Call user32.GetIconInfo(00020030,0032f97c) ret=4297dc27 0009:Ret user32.GetIconInfo() retval=00000001 ret=4297dc27 0009:Call gdi32.GetObjectW(000003a8,00000018,0032f964) ret=4297dc4c 0009:Ret gdi32.GetObjectW() retval=00000018 ret=4297dc4c 0009:Call gdi32.CreateCompatibleDC(00000000) ret=4297dc6d 0009:Ret gdi32.CreateCompatibleDC() retval=000003ac ret=4297dc6d 0009:Call gdi32.GetObjectW(0000038c,00000018,0032f8d8) ret=4297d3de 0009:Ret gdi32.GetObjectW() retval=00000018 ret=4297d3de 0009:Call gdi32.SelectObject(000003ac,0000038c) ret=4297d411 0009:Ret gdi32.SelectObject() retval=0000006c ret=4297d411 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=4297d438 0009:Ret ntdll.RtlAllocateHeap() retval=0014ad78 ret=4297d438 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000400) ret=4297d4b7 0009:Ret ntdll.RtlAllocateHeap() retval=0014b1a8 ret=4297d4b7 0009:Call gdi32.GetDIBits(000003ac,0000038c,00000000,00000010,0014b1a8,0014ad78,00000000) ret=4297d4f3 0009:Ret gdi32.GetDIBits() retval=fffffff0 ret=4297d4f3 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=4297d54c 0009:Ret ntdll.RtlAllocateHeap() retval=00147e40 ret=4297d54c 0009:Call ntdll.RtlAllocateHeap(00110000,00000008,00000400) ret=4297d5d7 0009:Ret ntdll.RtlAllocateHeap() retval=0014b5b0 ret=4297d5d7 0009:Call gdi32.GetDIBits(000003ac,000003a8,00000000,00000010,0014b5b0,00147e40,00000000) ret=4297d619 0009:Ret gdi32.GetDIBits() retval=fffffff0 ret=4297d619 0009:Call gdi32.StretchDIBits(00000298,00000000,00000000,00000010,00000010,00000000,00000000,00000010,00000010,0014b1a8,0014ad78,00000000,00cc0020) ret=4297da8a 0009:Ret gdi32.StretchDIBits() retval=00000010 ret=4297da8a 0009:Call gdi32.StretchDIBits(000002a4,00000000,00000000,00000010,00000010,00000000,00000000,00000010,00000010,0014b5b0,00147e40,00000000,00cc0020) ret=4297d86d 0009:Ret gdi32.StretchDIBits() retval=00000010 ret=4297d86d 0009:Call ntdll.RtlFreeHeap(00110000,00000000,0014ad78) ret=4297d8c2 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d8c2 0009:Call ntdll.RtlFreeHeap(00110000,00000000,00147e40) ret=4297d8e5 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d8e5 0009:Call ntdll.RtlFreeHeap(00110000,00000000,0014b1a8) ret=4297d908 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d908 0009:Call ntdll.RtlFreeHeap(00110000,00000000,0014b5b0) ret=4297d92b 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d92b 0009:Call user32.DestroyIcon(00020030) ret=4297de07 0009:Ret user32.DestroyIcon() retval=00000001 ret=4297de07 0009:Call gdi32.DeleteDC(000003ac) ret=4297de1c 0009:Ret gdi32.DeleteDC() retval=00000001 ret=4297de1c 0009:Call gdi32.DeleteObject(0000038c) ret=4297de2e 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297de2e 0009:Call gdi32.DeleteObject(000003a8) ret=4297de40 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297de40 0009:Ret comctl32.ImageList_ReplaceIcon() retval=00000000 ret=426f17bd 0009:Call comctl32.ImageList_ReplaceIcon(001433d0,ffffffff,00020038) ret=426f17e1 0009:Call user32.CopyImage(00020038,00000001,00000020,00000020,00004000) ret=4297dbfc 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x406272cd ip=406272cd tid=0009 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=00370000 0009:trace:seh:raise_exception eax=00000000 ebx=000003f8 ecx=00000000 edx=00000000 esi=00000001 edi=00370000 0009:trace:seh:raise_exception ebp=0032f5d8 esp=0032f550 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010246 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned ffffffff 0009:Ret user32.CopyImage() retval=00030030 ret=4297dbfc 0009:Call user32.GetIconInfo(00030030,0032f97c) ret=4297dc27 0009:Ret user32.GetIconInfo() retval=00000001 ret=4297dc27 0009:Call gdi32.GetObjectW(00000430,00000018,0032f964) ret=4297dc4c 0009:Ret gdi32.GetObjectW() retval=00000018 ret=4297dc4c 0009:Call gdi32.CreateCompatibleDC(00000000) ret=4297dc6d 0009:Ret gdi32.CreateCompatibleDC() retval=00000434 ret=4297dc6d 0009:Call gdi32.GetObjectW(00000414,00000018,0032f8d8) ret=4297d3de 0009:Ret gdi32.GetObjectW() retval=00000018 ret=4297d3de 0009:Call gdi32.SelectObject(00000434,00000414) ret=4297d411 0009:Ret gdi32.SelectObject() retval=0000006c ret=4297d411 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=4297d438 0009:Ret ntdll.RtlAllocateHeap() retval=0014b988 ret=4297d438 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=4297d4b7 0009:Ret ntdll.RtlAllocateHeap() retval=0014bdb8 ret=4297d4b7 0009:Call gdi32.GetDIBits(00000434,00000414,00000000,00000020,0014bdb8,0014b988,00000000) ret=4297d4f3 0009:Ret gdi32.GetDIBits() retval=ffffffe0 ret=4297d4f3 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=4297d54c 0009:Ret ntdll.RtlAllocateHeap() retval=00147fb0 ret=4297d54c 0009:Call ntdll.RtlAllocateHeap(00110000,00000008,00001000) ret=4297d5d7 0009:Ret ntdll.RtlAllocateHeap() retval=0014cdc0 ret=4297d5d7 0009:Call gdi32.GetDIBits(00000434,00000430,00000000,00000020,0014cdc0,00147fb0,00000000) ret=4297d619 0009:Ret gdi32.GetDIBits() retval=ffffffe0 ret=4297d619 0009:Call gdi32.StretchDIBits(000002d0,00000000,00000000,00000020,00000020,00000000,00000000,00000020,00000020,0014bdb8,0014b988,00000000,00cc0020) ret=4297da8a 0009:Ret gdi32.StretchDIBits() retval=00000020 ret=4297da8a 0009:Call gdi32.StretchDIBits(000002dc,00000000,00000000,00000020,00000020,00000000,00000000,00000020,00000020,0014cdc0,00147fb0,00000000,00cc0020) ret=4297d86d 0009:Ret gdi32.StretchDIBits() retval=00000020 ret=4297d86d 0009:Call ntdll.RtlFreeHeap(00110000,00000000,0014b988) ret=4297d8c2 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d8c2 0009:Call ntdll.RtlFreeHeap(00110000,00000000,00147fb0) ret=4297d8e5 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d8e5 0009:Call ntdll.RtlFreeHeap(00110000,00000000,0014bdb8) ret=4297d908 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d908 0009:Call ntdll.RtlFreeHeap(00110000,00000000,0014cdc0) ret=4297d92b 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d92b 0009:Call user32.DestroyIcon(00030030) ret=4297de07 0009:Ret user32.DestroyIcon() retval=00000001 ret=4297de07 0009:Call gdi32.DeleteDC(00000434) ret=4297de1c 0009:Ret gdi32.DeleteDC() retval=00000001 ret=4297de1c 0009:Call gdi32.DeleteObject(00000414) ret=4297de2e 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297de2e 0009:Call gdi32.DeleteObject(00000430) ret=4297de40 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297de40 0009:Ret comctl32.ImageList_ReplaceIcon() retval=00000000 ret=426f17e1 0009:Call ole32.CoTaskMemAlloc(00000014) ret=427080ac 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000014) ret=42a99fa3 0009:Ret ntdll.RtlAllocateHeap() retval=00148308 ret=42a99fa3 0009:Ret ole32.CoTaskMemAlloc() retval=00148308 ret=427080ac 0009:Call KERNEL32.GetFullPathNameW(428991e0 L"C:\\windows\\system32\\shell32.dll",00000104,0032faa8,00000000) ret=426f16e6 0009:Ret KERNEL32.GetFullPathNameW() retval=0000001f ret=426f16e6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000040) ret=426f172e 0009:Ret ntdll.RtlAllocateHeap() retval=00149138 ret=426f172e 0009:Call comctl32.334(00141758,00007fff,00148308) ret=426f1791 0009:Ret comctl32.334() retval=00000001 ret=426f1791 0009:Call comctl32.ImageList_ReplaceIcon(00141970,ffffffff,0002003a) ret=426f17bd 0009:Call user32.CopyImage(0002003a,00000001,00000010,00000010,00004000) ret=4297dbfc 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x406272cd ip=406272cd tid=0009 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=00370000 0009:trace:seh:raise_exception eax=9999cccc ebx=00000480 ecx=000000ac edx=00000067 esi=00000001 edi=00370000 0009:trace:seh:raise_exception ebp=0032f5d8 esp=0032f550 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010a02 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned ffffffff 0009:Ret user32.CopyImage() retval=00040030 ret=4297dbfc 0009:Call user32.GetIconInfo(00040030,0032f97c) ret=4297dc27 0009:Ret user32.GetIconInfo() retval=00000001 ret=4297dc27 0009:Call gdi32.GetObjectW(000004b8,00000018,0032f964) ret=4297dc4c 0009:Ret gdi32.GetObjectW() retval=00000018 ret=4297dc4c 0009:Call gdi32.CreateCompatibleDC(00000000) ret=4297c859 0009:Ret gdi32.CreateCompatibleDC() retval=000004bc ret=4297c859 0009:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42969623 0009:Ret KERNEL32.LocalAlloc() retval=001491e0 ret=42969623 0009:Call gdi32.CreateDIBSection(000004bc,001491e0,00000000,0032f87c,00000000,00000000) ret=4297c5b7 0009:Ret gdi32.CreateDIBSection() retval=000004c8 ret=4297c5b7 0009:Call KERNEL32.LocalFree(001491e0) ret=4296936b 0009:Ret KERNEL32.LocalFree() retval=00000000 ret=4296936b 0009:Call gdi32.SelectObject(000004bc,000004c8) ret=4297c9a2 0009:Ret gdi32.SelectObject() retval=0000006c ret=4297c9a2 0009:Call gdi32.BitBlt(000004bc,00000000,00000000,00000040,00000090,00000298,00000000,00000000,00cc0020) ret=4297c9ef 0009:Ret gdi32.BitBlt() retval=00000001 ret=4297c9ef 0009:Call gdi32.SelectObject(000004bc,0000006c) ret=4297ca01 0009:Ret gdi32.SelectObject() retval=000004c8 ret=4297ca01 0009:Call gdi32.SelectObject(00000298,000004c8) ret=4297c891 0009:Ret gdi32.SelectObject() retval=000002b0 ret=4297c891 0009:Call gdi32.DeleteObject(000002b0) ret=4297c89f 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297c89f 0009:Call gdi32.CreateBitmap(00000040,00000090,00000001,00000001,00000000) ret=4297c93a 0009:Ret gdi32.CreateBitmap() retval=000004cc ret=4297c93a 0009:Call gdi32.SelectObject(000004bc,000004cc) ret=4297caa7 0009:Ret gdi32.SelectObject() retval=0000006c ret=4297caa7 0009:Call gdi32.BitBlt(000004bc,00000000,00000000,00000040,00000090,000002a4,00000000,00000000,00cc0020) ret=4297caf4 0009:Ret gdi32.BitBlt() retval=00000001 ret=4297caf4 0009:Call gdi32.SelectObject(000004bc,0000006c) ret=4297cb06 0009:Ret gdi32.SelectObject() retval=000004cc ret=4297cb06 0009:Call gdi32.SelectObject(000002a4,000004cc) ret=4297c965 0009:Ret gdi32.SelectObject() retval=000002b4 ret=4297c965 0009:Call gdi32.DeleteObject(000002b4) ret=4297c973 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297c973 0009:Call ntdll.RtlReAllocateHeap(00110000,00000008,00141f58,00000022) ret=4297c8dc 0009:Ret ntdll.RtlReAllocateHeap() retval=00141f58 ret=4297c8dc 0009:Call gdi32.DeleteDC(000004bc) ret=4297c8fe 0009:Ret gdi32.DeleteDC() retval=00000001 ret=4297c8fe 0009:Call gdi32.CreateCompatibleDC(00000000) ret=4297dc6d 0009:Ret gdi32.CreateCompatibleDC() retval=000004d0 ret=4297dc6d 0009:Call gdi32.GetObjectW(0000049c,00000018,0032f8d8) ret=4297d3de 0009:Ret gdi32.GetObjectW() retval=00000018 ret=4297d3de 0009:Call gdi32.SelectObject(000004d0,0000049c) ret=4297d411 0009:Ret gdi32.SelectObject() retval=0000006c ret=4297d411 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=4297d438 0009:Ret ntdll.RtlAllocateHeap() retval=00141f88 ret=4297d438 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000400) ret=4297d4b7 0009:Ret ntdll.RtlAllocateHeap() retval=001423b8 ret=4297d4b7 0009:Call gdi32.GetDIBits(000004d0,0000049c,00000000,00000010,001423b8,00141f88,00000000) ret=4297d4f3 0009:Ret gdi32.GetDIBits() retval=fffffff0 ret=4297d4f3 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=4297d54c 0009:Ret ntdll.RtlAllocateHeap() retval=001491b8 ret=4297d54c 0009:Call ntdll.RtlAllocateHeap(00110000,00000008,00000400) ret=4297d5d7 0009:Ret ntdll.RtlAllocateHeap() retval=001427c0 ret=4297d5d7 0009:Call gdi32.GetDIBits(000004d0,000004b8,00000000,00000010,001427c0,001491b8,00000000) ret=4297d619 0009:Ret gdi32.GetDIBits() retval=fffffff0 ret=4297d619 0009:Call gdi32.StretchDIBits(00000298,00000010,00000000,00000010,00000010,00000000,00000000,00000010,00000010,001423b8,00141f88,00000000,00cc0020) ret=4297da8a 0009:Ret gdi32.StretchDIBits() retval=00000010 ret=4297da8a 0009:Call gdi32.StretchDIBits(000002a4,00000010,00000000,00000010,00000010,00000000,00000000,00000010,00000010,001427c0,001491b8,00000000,00cc0020) ret=4297d86d 0009:Ret gdi32.StretchDIBits() retval=00000010 ret=4297d86d 0009:Call ntdll.RtlFreeHeap(00110000,00000000,00141f88) ret=4297d8c2 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d8c2 0009:Call ntdll.RtlFreeHeap(00110000,00000000,001491b8) ret=4297d8e5 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d8e5 0009:Call ntdll.RtlFreeHeap(00110000,00000000,001423b8) ret=4297d908 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d908 0009:Call ntdll.RtlFreeHeap(00110000,00000000,001427c0) ret=4297d92b 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d92b 0009:Call user32.DestroyIcon(00040030) ret=4297de07 0009:Ret user32.DestroyIcon() retval=00000001 ret=4297de07 0009:Call gdi32.DeleteDC(000004d0) ret=4297de1c 0009:Ret gdi32.DeleteDC() retval=00000001 ret=4297de1c 0009:Call gdi32.DeleteObject(0000049c) ret=4297de2e 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297de2e 0009:Call gdi32.DeleteObject(000004b8) ret=4297de40 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297de40 0009:Ret comctl32.ImageList_ReplaceIcon() retval=00000001 ret=426f17bd 0009:Call comctl32.ImageList_ReplaceIcon(001433d0,ffffffff,00020038) ret=426f17e1 0009:Call user32.CopyImage(00020038,00000001,00000020,00000020,00004000) ret=4297dbfc 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x406272cd ip=406272cd tid=0009 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=00330000 0009:trace:seh:raise_exception eax=00000000 ebx=0000051c ecx=00000000 edx=00000000 esi=00000001 edi=00330000 0009:trace:seh:raise_exception ebp=0032f5d8 esp=0032f550 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010246 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned ffffffff 0009:Ret user32.CopyImage() retval=00050030 ret=4297dbfc 0009:Call user32.GetIconInfo(00050030,0032f97c) ret=4297dc27 0009:Ret user32.GetIconInfo() retval=00000001 ret=4297dc27 0009:Call gdi32.GetObjectW(00000554,00000018,0032f964) ret=4297dc4c 0009:Ret gdi32.GetObjectW() retval=00000018 ret=4297dc4c 0009:Call gdi32.CreateCompatibleDC(00000000) ret=4297c859 0009:Ret gdi32.CreateCompatibleDC() retval=00000558 ret=4297c859 0009:Call KERNEL32.LocalAlloc(00000040,00000028) ret=42969623 0009:Ret KERNEL32.LocalAlloc() retval=00143048 ret=42969623 0009:Call gdi32.CreateDIBSection(00000558,00143048,00000000,0032f87c,00000000,00000000) ret=4297c5b7 0009:Ret gdi32.CreateDIBSection() retval=00000564 ret=4297c5b7 0009:Call KERNEL32.LocalFree(00143048) ret=4296936b 0009:Ret KERNEL32.LocalFree() retval=00000000 ret=4296936b 0009:Call gdi32.SelectObject(00000558,00000564) ret=4297c9a2 0009:Ret gdi32.SelectObject() retval=0000006c ret=4297c9a2 0009:Call gdi32.BitBlt(00000558,00000000,00000000,00000080,00000120,000002d0,00000000,00000000,00cc0020) ret=4297c9ef 0009:Ret gdi32.BitBlt() retval=00000001 ret=4297c9ef 0009:Call gdi32.SelectObject(00000558,0000006c) ret=4297ca01 0009:Ret gdi32.SelectObject() retval=00000564 ret=4297ca01 0009:Call gdi32.SelectObject(000002d0,00000564) ret=4297c891 0009:Ret gdi32.SelectObject() retval=000002e8 ret=4297c891 0009:Call gdi32.DeleteObject(000002e8) ret=4297c89f 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297c89f 0009:Call gdi32.CreateBitmap(00000080,00000120,00000001,00000001,00000000) ret=4297c93a 0009:Ret gdi32.CreateBitmap() retval=00000568 ret=4297c93a 0009:Call gdi32.SelectObject(00000558,00000568) ret=4297caa7 0009:Ret gdi32.SelectObject() retval=0000006c ret=4297caa7 0009:Call gdi32.BitBlt(00000558,00000000,00000000,00000080,00000120,000002dc,00000000,00000000,00cc0020) ret=4297caf4 0009:Ret gdi32.BitBlt() retval=00000001 ret=4297caf4 0009:Call gdi32.SelectObject(00000558,0000006c) ret=4297cb06 0009:Ret gdi32.SelectObject() retval=00000568 ret=4297cb06 0009:Call gdi32.SelectObject(000002dc,00000568) ret=4297c965 0009:Ret gdi32.SelectObject() retval=000002ec ret=4297c965 0009:Call gdi32.DeleteObject(000002ec) ret=4297c973 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297c973 0009:Call ntdll.RtlReAllocateHeap(00110000,00000008,001439b8,00000022) ret=4297c8dc 0009:Ret ntdll.RtlReAllocateHeap() retval=001439b8 ret=4297c8dc 0009:Call gdi32.DeleteDC(00000558) ret=4297c8fe 0009:Ret gdi32.DeleteDC() retval=00000001 ret=4297c8fe 0009:Call gdi32.CreateCompatibleDC(00000000) ret=4297dc6d 0009:Ret gdi32.CreateCompatibleDC() retval=0000056c ret=4297dc6d 0009:Call gdi32.GetObjectW(00000538,00000018,0032f8d8) ret=4297d3de 0009:Ret gdi32.GetObjectW() retval=00000018 ret=4297d3de 0009:Call gdi32.SelectObject(0000056c,00000538) ret=4297d411 0009:Ret gdi32.SelectObject() retval=0000006c ret=4297d411 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000428) ret=4297d438 0009:Ret ntdll.RtlAllocateHeap() retval=0014a820 ret=4297d438 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00001000) ret=4297d4b7 0009:Ret ntdll.RtlAllocateHeap() retval=001439e8 ret=4297d4b7 0009:Call gdi32.GetDIBits(0000056c,00000538,00000000,00000020,001439e8,0014a820,00000000) ret=4297d4f3 0009:Ret gdi32.GetDIBits() retval=ffffffe0 ret=4297d4f3 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=4297d54c 0009:Ret ntdll.RtlAllocateHeap() retval=001491c0 ret=4297d54c 0009:Call ntdll.RtlAllocateHeap(00110000,00000008,00001000) ret=4297d5d7 0009:Ret ntdll.RtlAllocateHeap() retval=001449f0 ret=4297d5d7 0009:Call gdi32.GetDIBits(0000056c,00000554,00000000,00000020,001449f0,001491c0,00000000) ret=4297d619 0009:Ret gdi32.GetDIBits() retval=ffffffe0 ret=4297d619 0009:Call gdi32.StretchDIBits(000002d0,00000020,00000000,00000020,00000020,00000000,00000000,00000020,00000020,001439e8,0014a820,00000000,00cc0020) ret=4297da8a 0009:Ret gdi32.StretchDIBits() retval=00000020 ret=4297da8a 0009:Call gdi32.StretchDIBits(000002dc,00000020,00000000,00000020,00000020,00000000,00000000,00000020,00000020,001449f0,001491c0,00000000,00cc0020) ret=4297d86d 0009:Ret gdi32.StretchDIBits() retval=00000020 ret=4297d86d 0009:Call ntdll.RtlFreeHeap(00110000,00000000,0014a820) ret=4297d8c2 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d8c2 0009:Call ntdll.RtlFreeHeap(00110000,00000000,001491c0) ret=4297d8e5 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d8e5 0009:Call ntdll.RtlFreeHeap(00110000,00000000,001439e8) ret=4297d908 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d908 0009:Call ntdll.RtlFreeHeap(00110000,00000000,001449f0) ret=4297d92b 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4297d92b 0009:Call user32.DestroyIcon(00050030) ret=4297de07 0009:Ret user32.DestroyIcon() retval=00000001 ret=4297de07 0009:Call gdi32.DeleteDC(0000056c) ret=4297de1c 0009:Ret gdi32.DeleteDC() retval=00000001 ret=4297de1c 0009:Call gdi32.DeleteObject(00000538) ret=4297de2e 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297de2e 0009:Call gdi32.DeleteObject(00000554) ret=4297de40 0009:Ret gdi32.DeleteObject() retval=00000001 ret=4297de40 0009:Ret comctl32.ImageList_ReplaceIcon() retval=00000001 ret=426f17e1 0009:Ret PE DLL (proc=0x42745ab0,module=0x426d0000 L"shell32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x42c5dc80,module=0x42c20000 L"ddraw.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call gdi32.GetStockObject(00000004) ret=42c4c516 0009:Ret gdi32.GetStockObject() retval=00000054 ret=42c4c516 0009:Call user32.RegisterClassA(0032fbf0) ret=42c4c543 0009:Ret user32.RegisterClassA() retval=0000c030 ret=42c4c543 0009:Call advapi32.RegOpenKeyA(80000001,42c64ac8 "Software\\Wine\\Direct3D",0032fc24) ret=42c4c620 0009:Ret advapi32.RegOpenKeyA() retval=00000002 ret=42c4c620 0009:Call KERNEL32.GetModuleFileNameA(00000000,0032fc2e,00000104) ret=42c4c658 0009:Ret KERNEL32.GetModuleFileNameA() retval=0000002b ret=42c4c658 0009:Call advapi32.RegOpenKeyA(80000001,42c64adf "Software\\Wine\\AppDefaults",0032fc1c) ret=42c4c7d8 0009:Ret advapi32.RegOpenKeyA() retval=00000002 ret=42c4c7d8 0009:Call advapi32.RegOpenKeyA(80000002,42c64b9f "Software\\Microsoft\\DirectDraw",0032fc24) ret=42c4c78d 0009:Ret advapi32.RegOpenKeyA() retval=00000002 ret=42c4c78d 0009:Call KERNEL32.DisableThreadLibraryCalls(42c20000) ret=42c4c7a6 0009:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=42c4c7a6 0009:Ret PE DLL (proc=0x42c5dc80,module=0x42c20000 L"ddraw.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x42cb8040,module=0x42c90000 L"winmm.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call KERNEL32.DisableThreadLibraryCalls(42c90000) ret=42cb608b 0009:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=42cb608b 0009:Call KERNEL32.CreateEventW(00000000,00000001,00000000,00000000) ret=42cb60ba 0009:Ret KERNEL32.CreateEventW() retval=00000040 ret=42cb60ba 0009:Call KERNEL32.CreateEventW(00000000,00000001,00000000,00000000) ret=42cb60e9 0009:Ret KERNEL32.CreateEventW() retval=00000048 ret=42cb60e9 0009:Ret PE DLL (proc=0x42cb8040,module=0x42c90000 L"winmm.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x21133a87,module=0x21100000 L"mss32.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call KERNEL32.GetVersion() ret=211339dc 0009:Ret KERNEL32.GetVersion() retval=0a280105 ret=211339dc 0009:Call KERNEL32.HeapCreate(00000001,00001000,00000000) ret=211363f3 0009:Ret KERNEL32.HeapCreate() retval=0144c000 ret=211363f3 0009:Call KERNEL32.GetVersionExA(0032fce4) ret=211362b9 0009:Ret KERNEL32.GetVersionExA() retval=00000001 ret=211362b9 0009:Call KERNEL32.GetCommandLineA() ret=21133a25 0009:Ret KERNEL32.GetCommandLineA() retval=001430d0 ret=21133a25 0009:Call KERNEL32.GetEnvironmentStringsW() ret=211369d2 0009:Ret KERNEL32.GetEnvironmentStringsW() retval=00220000 ret=211369d2 0009:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00220000 L"DYLD_FALLBACK_LIBRARY_PATH=/opt/local/lib",0000062c,00000000,00000000,00000000,00000000) ret=21136a4a 0009:Ret KERNEL32.WideCharToMultiByte() retval=0000062c ret=21136a4a 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000630) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144c138 ret=21136d23 0009:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00220000 L"DYLD_FALLBACK_LIBRARY_PATH=/opt/local/lib",0000062c,0144c138,0000062c,00000000,00000000) ret=21136a6c 0009:Ret KERNEL32.WideCharToMultiByte() retval=0000062c ret=21136a6c 0009:Call KERNEL32.FreeEnvironmentStringsW(00220000) ret=21136a89 0009:Ret KERNEL32.FreeEnvironmentStringsW() retval=00000001 ret=21136a89 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000100) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144c770 ret=21136d23 0009:Call KERNEL32.GetStartupInfoA(0032fd44) ret=21136540 0009:Ret KERNEL32.GetStartupInfoA() retval=0032fd44 ret=21136540 0009:Call KERNEL32.GetStdHandle(fffffff6) ret=2113663f 0009:Ret KERNEL32.GetStdHandle() retval=00000004 ret=2113663f 0009:Call KERNEL32.GetFileType(00000004) ret=2113664d 0009:Ret KERNEL32.GetFileType() retval=00000002 ret=2113664d 0009:Call KERNEL32.GetStdHandle(fffffff5) ret=2113663f 0009:Ret KERNEL32.GetStdHandle() retval=00000008 ret=2113663f 0009:Call KERNEL32.GetFileType(00000008) ret=2113664d 0009:Ret KERNEL32.GetFileType() retval=00000001 ret=2113664d 0009:Call KERNEL32.GetStdHandle(fffffff4) ret=2113663f 0009:Ret KERNEL32.GetStdHandle() retval=0000000c ret=2113663f 0009:Call KERNEL32.GetFileType(0000000c) ret=2113664d 0009:Ret KERNEL32.GetFileType() retval=00000001 ret=2113664d 0009:Call KERNEL32.SetHandleCount(00000020) ret=21136684 0009:Ret KERNEL32.SetHandleCount() retval=00000020 ret=21136684 0009:Call KERNEL32.GetACP() ret=2113aa39 0009:Ret KERNEL32.GetACP() retval=000004e4 ret=2113aa39 0009:Call KERNEL32.GetCPInfo(000004e4,0032fd48) ret=2113aa76 0009:Ret KERNEL32.GetCPInfo() retval=00000001 ret=2113aa76 0009:Call KERNEL32.GetCPInfo(000004e4,0032fd20) ret=2113ac81 0009:Ret KERNEL32.GetCPInfo() retval=00000001 ret=2113ac81 0009:Call KERNEL32.GetStringTypeW(00000001,21147ccc L"",00000001,0032f7dc) ret=21139529 0009:Ret KERNEL32.GetStringTypeW() retval=00000001 ret=21139529 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,00000000,00000000) ret=211395af 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=211395af 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,0032f5c4,00000100) ret=21139605 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=21139605 0009:Call KERNEL32.GetStringTypeW(00000001,0032f5c4 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032f820) ret=21139617 0009:Ret KERNEL32.GetStringTypeW() retval=00000001 ret=21139617 0009:Call KERNEL32.LCMapStringW(00000000,00000100,21147ccc L"",00000001,00000000,00000000) ret=2113565d 0009:Ret KERNEL32.LCMapStringW() retval=00000001 ret=2113565d 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,00000000,00000000) ret=211356fa 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=211356fa 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,0032f5a0,00000100) ret=21135752 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=21135752 0009:Call KERNEL32.LCMapStringW(00000000,00000100,0032f5a0 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,00000000,00000000) ret=21135768 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=21135768 0009:Call KERNEL32.LCMapStringW(00000000,00000100,0032f5a0 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032f3a0,00000100) ret=21135803 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=21135803 0009:Call KERNEL32.WideCharToMultiByte(000004e4,00000220,0032f3a0 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0161"...,00000100,0032fb20,00000100,00000000,00000000) ret=21135828 0009:Ret KERNEL32.WideCharToMultiByte() retval=00000100 ret=21135828 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,00000000,00000000) ret=211356fa 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=211356fa 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,0032f580,00000100) ret=21135752 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=21135752 0009:Call KERNEL32.LCMapStringW(00000000,00000200,0032f580 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,00000000,00000000) ret=21135768 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=21135768 0009:Call KERNEL32.LCMapStringW(00000000,00000200,0032f580 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032f380,00000100) ret=21135803 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=21135803 0009:Call KERNEL32.WideCharToMultiByte(000004e4,00000220,0032f380 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~\007f\20ac\0081\201a\0191\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032fa20,00000100,00000000,00000000) ret=21135828 0009:Ret KERNEL32.WideCharToMultiByte() retval=00000100 ret=21135828 0009:Call KERNEL32.GetModuleFileNameA(00000000,2115536c,00000104) ret=21136791 0009:Ret KERNEL32.GetModuleFileNameA() retval=0000002b ret=21136791 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000040) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144c878 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,000000d0) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144c8c0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000030) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144c998 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144c9d0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144c9f8 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000010) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144ca20 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144ca38 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000040) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144ca60 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000040) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144caa8 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144caf0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000010) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cb18 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cb30 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000030) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cb58 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000030) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cb90 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cbc8 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cbf0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000010) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cc18 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000010) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cc30 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,000000b0) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cc48 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cd00 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000010) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cd28 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000030) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cd40 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cd78 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cda0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cdc8 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000040) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cdf0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144ce38 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000010) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144ce60 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000040) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144ce78 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cec0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000050) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cee8 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cf40 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cf68 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cf90 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000010) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cfb8 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cfd0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144cff8 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000030) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d020 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000040) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d058 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d0a0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d0c8 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d0f0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d118 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000030) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d140 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d178 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000010) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d1a0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d1b8 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000040) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d1e0 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d228 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d250 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000010) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d278 ret=21136d23 0009:Call ntdll.RtlAllocateHeap(0144c000,00000000,00000020) ret=21136d23 0009:Ret ntdll.RtlAllocateHeap() retval=0144d290 ret=21136d23 0009:Call ntdll.RtlFreeHeap(0144c000,00000000,0144c138) ret=21134ea8 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=21134ea8 0009:Call KERNEL32.GetModuleHandleA(2113e4c8 "KERNEL32") ret=211350f1 0009:Ret KERNEL32.GetModuleHandleA() retval=7b810000 ret=211350f1 0009:Call KERNEL32.GetProcAddress(7b810000,21147c98 "IsProcessorFeaturePresent") ret=21135101 0009:Ret KERNEL32.GetProcAddress() retval=7b8165d0 ret=21135101 0009:Call KERNEL32.IsProcessorFeaturePresent(00000000) ret=21135109 0009:Ret KERNEL32.IsProcessorFeaturePresent() retval=00000000 ret=21135109 0009:Call ntdll.RtlAllocateHeap(0144c000,00000008,00000800) ret=2113b263 0009:Ret ntdll.RtlAllocateHeap() retval=0144d2b8 ret=2113b263 0009:Call KERNEL32.GetModuleFileNameA(21100000,211509dc,00000103) ret=21101d08 0009:Ret KERNEL32.GetModuleFileNameA() retval=0000002c ret=21101d08 0009:Call KERNEL32.GetWindowsDirectoryA(0032fc80,00000103) ret=21101d42 0009:Ret KERNEL32.GetWindowsDirectoryA() retval=0000000a ret=21101d42 0009:Call KERNEL32.GetSystemDirectoryA(0032fc80,00000103) ret=21101d85 0009:Ret KERNEL32.GetSystemDirectoryA() retval=00000013 ret=21101d85 0009:Call KERNEL32.GetVersionExA(0032fcf0) ret=21101f50 0009:Ret KERNEL32.GetVersionExA() retval=00000001 ret=21101f50 0009:Call KERNEL32.QueryPerformanceFrequency(21151df0) ret=21101f63 0009:Ret KERNEL32.QueryPerformanceFrequency() retval=00000001 ret=21101f63 0009:Call KERNEL32.QueryPerformanceCounter(211515d8) ret=21101f7c 0009:Ret KERNEL32.QueryPerformanceCounter() retval=00000001 ret=21101f7c 0009:Ret PE DLL (proc=0x21133a87,module=0x21100000 L"mss32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x1002c35c,module=0x10000000 L"binkw32.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call KERNEL32.GetVersion() ret=1002c2b1 0009:Ret KERNEL32.GetVersion() retval=0a280105 ret=1002c2b1 0009:Call KERNEL32.HeapCreate(00000001,00001000,00000000) ret=1002c5d3 0009:Ret KERNEL32.HeapCreate() retval=0155c000 ret=1002c5d3 0009:Call KERNEL32.GetVersionExA(0032fce4) ret=1002c499 0009:Ret KERNEL32.GetVersionExA() retval=00000001 ret=1002c499 0009:Call KERNEL32.GetCommandLineA() ret=1002c2fa 0009:Ret KERNEL32.GetCommandLineA() retval=001430d0 ret=1002c2fa 0009:Call KERNEL32.GetEnvironmentStringsW() ret=1002eef2 0009:Ret KERNEL32.GetEnvironmentStringsW() retval=00220000 ret=1002eef2 0009:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00220000 L"DYLD_FALLBACK_LIBRARY_PATH=/opt/local/lib",0000062c,00000000,00000000,00000000,00000000) ret=1002ef6a 0009:Ret KERNEL32.WideCharToMultiByte() retval=0000062c ret=1002ef6a 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000630) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155c138 ret=1002b950 0009:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00220000 L"DYLD_FALLBACK_LIBRARY_PATH=/opt/local/lib",0000062c,0155c138,0000062c,00000000,00000000) ret=1002ef8c 0009:Ret KERNEL32.WideCharToMultiByte() retval=0000062c ret=1002ef8c 0009:Call KERNEL32.FreeEnvironmentStringsW(00220000) ret=1002efa9 0009:Ret KERNEL32.FreeEnvironmentStringsW() retval=00000001 ret=1002efa9 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000100) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155c770 ret=1002b950 0009:Call KERNEL32.GetStartupInfoA(0032fd44) ret=1002ea60 0009:Ret KERNEL32.GetStartupInfoA() retval=0032fd44 ret=1002ea60 0009:Call KERNEL32.GetStdHandle(fffffff6) ret=1002eb5f 0009:Ret KERNEL32.GetStdHandle() retval=00000004 ret=1002eb5f 0009:Call KERNEL32.GetFileType(00000004) ret=1002eb6d 0009:Ret KERNEL32.GetFileType() retval=00000002 ret=1002eb6d 0009:Call KERNEL32.GetStdHandle(fffffff5) ret=1002eb5f 0009:Ret KERNEL32.GetStdHandle() retval=00000008 ret=1002eb5f 0009:Call KERNEL32.GetFileType(00000008) ret=1002eb6d 0009:Ret KERNEL32.GetFileType() retval=00000001 ret=1002eb6d 0009:Call KERNEL32.GetStdHandle(fffffff4) ret=1002eb5f 0009:Ret KERNEL32.GetStdHandle() retval=0000000c ret=1002eb5f 0009:Call KERNEL32.GetFileType(0000000c) ret=1002eb6d 0009:Ret KERNEL32.GetFileType() retval=00000001 ret=1002eb6d 0009:Call KERNEL32.SetHandleCount(00000020) ret=1002eba4 0009:Ret KERNEL32.SetHandleCount() retval=00000020 ret=1002eba4 0009:Call KERNEL32.GetACP() ret=10030fde 0009:Ret KERNEL32.GetACP() retval=000004e4 ret=10030fde 0009:Call KERNEL32.GetCPInfo(000004e4,0032fd48) ret=1003101b 0009:Ret KERNEL32.GetCPInfo() retval=00000001 ret=1003101b 0009:Call KERNEL32.GetCPInfo(000004e4,0032fd20) ret=10031226 0009:Ret KERNEL32.GetCPInfo() retval=00000001 ret=10031226 0009:Call KERNEL32.GetStringTypeW(00000001,10038788 L"",00000001,0032f7dc) ret=1003197f 0009:Ret KERNEL32.GetStringTypeW() retval=00000001 ret=1003197f 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,00000000,00000000) ret=10031a05 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=10031a05 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,0032f5c4,00000100) ret=10031a5b 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=10031a5b 0009:Call KERNEL32.GetStringTypeW(00000001,0032f5c4 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032f820) ret=10031a6d 0009:Ret KERNEL32.GetStringTypeW() retval=00000001 ret=10031a6d 0009:Call KERNEL32.LCMapStringW(00000000,00000100,10038788 L"",00000001,00000000,00000000) ret=1002f5f0 0009:Ret KERNEL32.LCMapStringW() retval=00000001 ret=1002f5f0 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,00000000,00000000) ret=1002f68d 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=1002f68d 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,0032f5a0,00000100) ret=1002f6e5 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=1002f6e5 0009:Call KERNEL32.LCMapStringW(00000000,00000100,0032f5a0 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,00000000,00000000) ret=1002f6fb 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=1002f6fb 0009:Call KERNEL32.LCMapStringW(00000000,00000100,0032f5a0 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032f3a0,00000100) ret=1002f796 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=1002f796 0009:Call KERNEL32.WideCharToMultiByte(000004e4,00000220,0032f3a0 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0161"...,00000100,0032fb20,00000100,00000000,00000000) ret=1002f7bb 0009:Ret KERNEL32.WideCharToMultiByte() retval=00000100 ret=1002f7bb 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,00000000,00000000) ret=1002f68d 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=1002f68d 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fc20 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,0032f580,00000100) ret=1002f6e5 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=1002f6e5 0009:Call KERNEL32.LCMapStringW(00000000,00000200,0032f580 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,00000000,00000000) ret=1002f6fb 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=1002f6fb 0009:Call KERNEL32.LCMapStringW(00000000,00000200,0032f580 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032f380,00000100) ret=1002f796 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=1002f796 0009:Call KERNEL32.WideCharToMultiByte(000004e4,00000220,0032f380 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~\007f\20ac\0081\201a\0191\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032fa20,00000100,00000000,00000000) ret=1002f7bb 0009:Ret KERNEL32.WideCharToMultiByte() retval=00000100 ret=1002f7bb 0009:Call KERNEL32.GetModuleFileNameA(00000000,1004f28c,00000104) ret=1002ecb1 0009:Ret KERNEL32.GetModuleFileNameA() retval=0000002b ret=1002ecb1 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000040) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155c878 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,000000d0) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155c8c0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000030) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155c998 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155c9d0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155c9f8 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000010) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155ca20 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155ca38 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000040) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155ca60 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000040) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155caa8 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155caf0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000010) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cb18 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cb30 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000030) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cb58 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000030) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cb90 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cbc8 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cbf0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000010) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cc18 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000010) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cc30 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,000000b0) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cc48 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cd00 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000010) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cd28 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000030) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cd40 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cd78 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cda0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cdc8 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000040) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cdf0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155ce38 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000010) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155ce60 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000040) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155ce78 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cec0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000050) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cee8 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cf40 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cf68 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cf90 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000010) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cfb8 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cfd0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155cff8 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000030) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d020 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000040) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d058 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d0a0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d0c8 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d0f0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d118 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000030) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d140 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d178 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000010) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d1a0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d1b8 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000040) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d1e0 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d228 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d250 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000010) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d278 ret=1002b950 0009:Call ntdll.RtlAllocateHeap(0155c000,00000000,00000020) ret=1002b950 0009:Ret ntdll.RtlAllocateHeap() retval=0155d290 ret=1002b950 0009:Call ntdll.RtlFreeHeap(0155c000,00000000,0155c138) ret=1002b9b8 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=1002b9b8 0009:Call KERNEL32.GetModuleHandleA(1003837c "KERNEL32") ret=1002d65c 0009:Ret KERNEL32.GetModuleHandleA() retval=7b810000 ret=1002d65c 0009:Call KERNEL32.GetProcAddress(7b810000,10038360 "IsProcessorFeaturePresent") ret=1002d66c 0009:Ret KERNEL32.GetProcAddress() retval=7b8165d0 ret=1002d66c 0009:Call KERNEL32.IsProcessorFeaturePresent(00000000) ret=1002d674 0009:Ret KERNEL32.IsProcessorFeaturePresent() retval=00000000 ret=1002d674 0009:Call KERNEL32.GetModuleFileNameA(10000000,0032fc8c,0000007f) ret=100010fe 0009:Ret KERNEL32.GetModuleFileNameA() retval=0000002e ret=100010fe 0009:Call KERNEL32.GetWindowsDirectoryA(0032fd0c,0000007f) ret=10001133 0009:Ret KERNEL32.GetWindowsDirectoryA() retval=0000000a ret=10001133 0009:Call KERNEL32.GetSystemDirectoryA(0032fd0c,0000007f) ret=1000115c 0009:Ret KERNEL32.GetSystemDirectoryA() retval=00000013 ret=1000115c 0009:Ret PE DLL (proc=0x1002c35c,module=0x10000000 L"binkw32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x401da010,module=0x401d0000 L"lz32.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call KERNEL32.DisableThreadLibraryCalls(401d0000) ret=401da0b8 0009:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=401da0b8 0009:Ret PE DLL (proc=0x401da010,module=0x401d0000 L"lz32.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x401c46a0,module=0x401b0000 L"version.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call KERNEL32.DisableThreadLibraryCalls(401b0000) ret=401c4748 0009:Ret KERNEL32.DisableThreadLibraryCalls() retval=00000001 ret=401c4748 0009:Ret PE DLL (proc=0x401c46a0,module=0x401b0000 L"version.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x42d7f480,module=0x42d30000 L"msvcrt.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call KERNEL32.TlsAlloc() ret=42d591b5 0009:Ret KERNEL32.TlsAlloc() retval=00000003 ret=42d591b5 0009:Call KERNEL32.InitializeCriticalSection(42da1b40) ret=42d58d2b 0009:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=42d58d2b 0009:Call ntdll.RtlAllocateHeap(00110000,00000008,00000064) ret=42d75301 0009:Ret ntdll.RtlAllocateHeap() retval=0014a5e0 ret=42d75301 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000008) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00147d48 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,000000d8) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00143130 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000220) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=0014a820 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000030) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=001491d0 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000100) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00147f88 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000100) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=0014aa48 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000002) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00143210 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000002) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=001492b8 ret=42d549d6 0009:Call KERNEL32.LCMapStringA(00000000,00000100,0032fae8 "",00000100,00147f88,00000100) ret=42d56edd 0009:Ret KERNEL32.LCMapStringA() retval=00000100 ret=42d56edd 0009:Call KERNEL32.LCMapStringA(00000000,00000200,0032fae8 "",00000100,0014aa48,00000100) ret=42d56f1c 0009:Ret KERNEL32.LCMapStringA() retval=00000100 ret=42d56f1c 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00147de8 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=0014a650 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00148090 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=001480a8 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=001485b8 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=001485d0 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=001485e8 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000002) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00148600 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000002) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00148618 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00148630 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000001) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00148648 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000002) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00148660 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000002) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00147e18 ret=42d549d6 0009:Call KERNEL32.InitializeCriticalSection(42da1b78) ret=42d58ee8 0009:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=42d58ee8 0009:Call KERNEL32.InitializeCriticalSection(42da1824) ret=42d50cb0 0009:Ret KERNEL32.InitializeCriticalSection() retval=00000001 ret=42d50cb0 0009:Call KERNEL32.GetStartupInfoA(0032fc3c) ret=42d50ccd 0009:Ret KERNEL32.GetStartupInfoA() retval=0032fc3c ret=42d50ccd 0009:Call KERNEL32.GetStdHandle(fffffff6) ret=42d5103c 0009:Ret KERNEL32.GetStdHandle() retval=00000004 ret=42d5103c 0009:Call KERNEL32.DuplicateHandle(ffffffff,00000004,ffffffff,42d8d700,00000000,00000001,00000002) ret=42d5107f 0009:Ret KERNEL32.DuplicateHandle() retval=00000001 ret=42d5107f 0009:Call KERNEL32.GetStdHandle(fffffff5) ret=42d50fcc 0009:Ret KERNEL32.GetStdHandle() retval=00000008 ret=42d50fcc 0009:Call KERNEL32.DuplicateHandle(ffffffff,00000008,ffffffff,42d8d724,00000000,00000001,00000002) ret=42d51014 0009:Ret KERNEL32.DuplicateHandle() retval=00000001 ret=42d51014 0009:Call KERNEL32.GetStdHandle(fffffff4) ret=42d50f0c 0009:Ret KERNEL32.GetStdHandle() retval=0000000c ret=42d50f0c 0009:Call KERNEL32.DuplicateHandle(ffffffff,0000000c,ffffffff,42d8d748,00000000,00000001,00000002) ret=42d50f54 0009:Ret KERNEL32.DuplicateHandle() retval=00000001 ret=42d50f54 0009:Call KERNEL32.CreateFileA(42d7f901 "CONIN$",80000000,00000001,00000000,00000003,00000000,00000000) ret=42d4236f 0009:Ret KERNEL32.CreateFileA() retval=00000058 ret=42d4236f 0009:Call KERNEL32.CreateFileA(42d7f908 "CONOUT$",40000000,00000002,00000000,00000003,00000000,00000000) ret=42d423b6 0009:Ret KERNEL32.CreateFileA() retval=0000005c ret=42d423b6 0009:Call KERNEL32.GetCommandLineA() ret=42d46a87 0009:Ret KERNEL32.GetCommandLineA() retval=001430d0 ret=42d46a87 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,0000002e) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=00147e80 ret=42d549d6 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,0000005c) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=0014ab50 ret=42d549d6 0009:Call KERNEL32.MultiByteToWideChar(00000000,00000001,00147e80 "\"C:\\Sierra\\Master of Olympus - Zeus\\Zeus.exe\"",0000002e,0014ab50,0000002e) ret=42d465c4 0009:Ret KERNEL32.MultiByteToWideChar() retval=0000002e ret=42d465c4 0009:Call KERNEL32.GetVersionExW(0032fb6c) ret=42d46b00 0009:Ret KERNEL32.GetVersionExW() retval=00000001 ret=42d46b00 0009:Call KERNEL32.GetEnvironmentStringsA() ret=42d46681 0009:Ret KERNEL32.GetEnvironmentStringsA() retval=00141f88 ret=42d46681 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,000006f8) ret=42d4677a 0009:Ret ntdll.RtlAllocateHeap() retval=001425c0 ret=42d4677a 0009:Call KERNEL32.FreeEnvironmentStringsA(00141f88) ret=42d46750 0009:Ret KERNEL32.FreeEnvironmentStringsA() retval=00000001 ret=42d46750 0009:Call KERNEL32.GetEnvironmentStringsW() ret=42d46911 0009:Ret KERNEL32.GetEnvironmentStringsW() retval=00220000 ret=42d46911 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000d24) ret=42d46a4e 0009:Ret ntdll.RtlAllocateHeap() retval=001439e8 ret=42d46a4e 0009:Call KERNEL32.FreeEnvironmentStringsW(00220000) ret=42d46a24 0009:Ret KERNEL32.FreeEnvironmentStringsW() retval=00000001 ret=42d46a24 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000104) ret=42d46bfa 0009:Ret ntdll.RtlAllocateHeap() retval=00142cc0 ret=42d46bfa 0009:Call KERNEL32.GetModuleFileNameA(00000000,00142cc0,00000104) ret=42d46c1f 0009:Ret KERNEL32.GetModuleFileNameA() retval=0000002b ret=42d46c1f 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000208) ret=42d46c61 0009:Ret ntdll.RtlAllocateHeap() retval=00142dd0 ret=42d46c61 0009:Call KERNEL32.GetModuleFileNameW(00000000,00142dd0,00000104) ret=42d46c86 0009:Ret KERNEL32.GetModuleFileNameW() retval=0000002b ret=42d46c86 0009:Call KERNEL32.SetConsoleCtrlHandler(42d4a820,00000001) ret=42d4b173 0009:Ret KERNEL32.SetConsoleCtrlHandler() retval=00000001 ret=42d4b173 0009:Call KERNEL32.SetUnhandledExceptionFilter(42d4a890) ret=42d4b184 0009:Ret KERNEL32.SetUnhandledExceptionFilter() retval=00000000 ret=42d4b184 0009:Call KERNEL32.GetCPInfo(00000000,0032fc58) ret=42d5dff4 0009:Ret KERNEL32.GetCPInfo() retval=00000001 ret=42d5dff4 0009:Call KERNEL32.MultiByteToWideChar(00000000,00000000,0032fb58 "",00000100,0032f758,00000100) ret=42d5e215 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=42d5e215 0009:Call KERNEL32.GetStringTypeW(00000001,0032f758 L"",00000100,0032f958) ret=42d5e24f 0009:Ret KERNEL32.GetStringTypeW() retval=00000001 ret=42d5e24f 0009:Call ntdll.LdrAddRefDll(00000000,42d30000) ret=42d5921a 0009:Ret ntdll.LdrAddRefDll() retval=00000000 ret=42d5921a 0009:Ret PE DLL (proc=0x42d7f480,module=0x42d30000 L"msvcrt.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Call PE DLL (proc=0x6001ffd0,module=0x60000000 L"ijl10.dll",reason=PROCESS_ATTACH,res=0x1) 0009:Call msvcrt.malloc(00000080) ret=6001ff38 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000080) ret=42d549d6 0009:Ret ntdll.RtlAllocateHeap() retval=0014abb8 ret=42d549d6 0009:Ret msvcrt.malloc() retval=0014abb8 ret=6001ff38 0009:Call msvcrt._initterm(60022000,60022004) ret=6001ff69 0009:Ret msvcrt._initterm() retval=00000000 ret=6001ff69 0009:Call KERNEL32.GetModuleFileNameA(60000000,0032fc44,00000104) ret=6001aa62 0009:Ret KERNEL32.GetModuleFileNameA() retval=0000002c ret=6001aa62 0009:Call version.GetFileVersionInfoSizeA(0032fc44 "C:\\Sierra\\Master of Olympus - Zeus\\ijl10.dll",0032fd64) ret=6001aa7d 0009:Call ntdll.RtlCreateUnicodeStringFromAsciiz(0032fb48,0032fc44 "C:\\Sierra\\Master of Olympus - Zeus\\ijl10.dll") ret=401c1613 0009:Ret ntdll.RtlCreateUnicodeStringFromAsciiz() retval=00000001 ret=401c1613 0009:Call KERNEL32.LZOpenFileW(00142ff8 L"C:\\Sierra\\Master of Olympus - Zeus\\ijl10.dll",0032fa64,00000000) ret=401c11da 0009:Ret KERNEL32.LZOpenFileW() retval=00000060 ret=401c11da 0009:Call KERNEL32.LZSeek(00000060,00000000,00000000) ret=401c3e13 0009:Ret KERNEL32.LZSeek() retval=00000000 ret=401c3e13 0009:Call KERNEL32.LZRead(00000060,0032f9bc,00000040) ret=401c3e33 0009:Ret KERNEL32.LZRead() retval=00000040 ret=401c3e33 0009:Call KERNEL32.LZSeek(00000060,000000c8,00000000) ret=401c3ecc 0009:Ret KERNEL32.LZSeek() retval=000000c8 ret=401c3ecc 0009:Call KERNEL32.LZRead(00000060,0032f9fd,00000002) ret=401c3ee6 0009:Ret KERNEL32.LZRead() retval=00000002 ret=401c3ee6 0009:Call KERNEL32.LZSeek(00000060,000000c8,00000000) ret=401c3f09 0009:Ret KERNEL32.LZSeek() retval=000000c8 ret=401c3f09 0009:Call KERNEL32.LZSeek(00000060,00000000,00000001) ret=401c4022 0009:Ret KERNEL32.LZSeek() retval=000000c8 ret=401c4022 0009:Call KERNEL32.LZRead(00000060,0032f8b0,00000108) ret=401c4045 0009:Ret KERNEL32.LZRead() retval=00000108 ret=401c4045 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,000000c8) ret=401c41cf 0009:Ret ntdll.RtlAllocateHeap() retval=0014ac40 ret=401c41cf 0009:Call KERNEL32.LZSeek(00000060,000001c0,00000000) ret=401c4205 0009:Ret KERNEL32.LZSeek() retval=000001c0 ret=401c4205 0009:Call KERNEL32.LZRead(00000060,0014ac40,000000c8) ret=401c421e 0009:Ret KERNEL32.LZRead() retval=000000c8 ret=401c421e 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000400) ret=401c42ac 0009:Ret ntdll.RtlAllocateHeap() retval=00141f88 ret=401c42ac 0009:Call KERNEL32.LZSeek(00000060,00020c00,00000000) ret=401c42da 0009:Ret KERNEL32.LZSeek() retval=00020c00 ret=401c42da 0009:Call KERNEL32.LZRead(00000060,00141f88,00000400) ret=401c42f3 0009:Ret KERNEL32.LZRead() retval=00000400 ret=401c42f3 0009:Call ntdll.RtlFreeHeap(00110000,00000000,00141f88) ret=401c4323 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c4323 0009:Call ntdll.RtlFreeHeap(00110000,00000000,0014ac40) ret=401c4349 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c4349 0009:Call KERNEL32.LZClose(00000060) ret=401c1218 0009:Ret KERNEL32.LZClose() retval=00000000 ret=401c1218 0009:Call ntdll.RtlFreeUnicodeString(0032fb48) ret=401c1632 0009:Ret ntdll.RtlFreeUnicodeString() retval=00000001 ret=401c1632 0009:Ret version.GetFileVersionInfoSizeA() retval=00000714 ret=6001aa7d 0009:Call KERNEL32.LocalAlloc(00000040,00000714) ret=6001aa93 0009:Ret KERNEL32.LocalAlloc() retval=00144718 ret=6001aa93 0009:Call version.GetFileVersionInfoA(0032fc44 "C:\\Sierra\\Master of Olympus - Zeus\\ijl10.dll",00000000,00000714,00144718) ret=6001aab5 0009:Call ntdll.RtlCreateUnicodeStringFromAsciiz(0032fb48,0032fc44 "C:\\Sierra\\Master of Olympus - Zeus\\ijl10.dll") ret=401c1d9f 0009:Ret ntdll.RtlCreateUnicodeStringFromAsciiz() retval=00000001 ret=401c1d9f 0009:Call KERNEL32.LZOpenFileW(00142ff8 L"C:\\Sierra\\Master of Olympus - Zeus\\ijl10.dll",0032fa54,00000000) ret=401c19aa 0009:Ret KERNEL32.LZOpenFileW() retval=00000060 ret=401c19aa 0009:Call KERNEL32.LZSeek(00000060,00000000,00000000) ret=401c3e13 0009:Ret KERNEL32.LZSeek() retval=00000000 ret=401c3e13 0009:Call KERNEL32.LZRead(00000060,0032f99c,00000040) ret=401c3e33 0009:Ret KERNEL32.LZRead() retval=00000040 ret=401c3e33 0009:Call KERNEL32.LZSeek(00000060,000000c8,00000000) ret=401c3ecc 0009:Ret KERNEL32.LZSeek() retval=000000c8 ret=401c3ecc 0009:Call KERNEL32.LZRead(00000060,0032f9dd,00000002) ret=401c3ee6 0009:Ret KERNEL32.LZRead() retval=00000002 ret=401c3ee6 0009:Call KERNEL32.LZSeek(00000060,000000c8,00000000) ret=401c3f09 0009:Ret KERNEL32.LZSeek() retval=000000c8 ret=401c3f09 0009:Call KERNEL32.LZSeek(00000060,00000000,00000001) ret=401c4022 0009:Ret KERNEL32.LZSeek() retval=000000c8 ret=401c4022 0009:Call KERNEL32.LZRead(00000060,0032f890,00000108) ret=401c4045 0009:Ret KERNEL32.LZRead() retval=00000108 ret=401c4045 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,000000c8) ret=401c41cf 0009:Ret ntdll.RtlAllocateHeap() retval=0014ac40 ret=401c41cf 0009:Call KERNEL32.LZSeek(00000060,000001c0,00000000) ret=401c4205 0009:Ret KERNEL32.LZSeek() retval=000001c0 ret=401c4205 0009:Call KERNEL32.LZRead(00000060,0014ac40,000000c8) ret=401c421e 0009:Ret KERNEL32.LZRead() retval=000000c8 ret=401c421e 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000400) ret=401c42ac 0009:Ret ntdll.RtlAllocateHeap() retval=00141f88 ret=401c42ac 0009:Call KERNEL32.LZSeek(00000060,00020c00,00000000) ret=401c42da 0009:Ret KERNEL32.LZSeek() retval=00020c00 ret=401c42da 0009:Call KERNEL32.LZRead(00000060,00141f88,00000400) ret=401c42f3 0009:Ret KERNEL32.LZRead() retval=00000400 ret=401c42f3 0009:Call ntdll.RtlFreeHeap(00110000,00000000,00141f88) ret=401c4323 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c4323 0009:Call ntdll.RtlFreeHeap(00110000,00000000,0014ac40) ret=401c4349 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c4349 0009:Call KERNEL32.LZSeek(00000060,00020c60,00000000) ret=401c1a03 0009:Ret KERNEL32.LZSeek() retval=00020c60 ret=401c1a03 0009:Call KERNEL32.LZRead(00000060,00144718,00000388) ret=401c1a35 0009:Ret KERNEL32.LZRead() retval=00000388 ret=401c1a35 0009:Call KERNEL32.LZClose(00000060) ret=401c1a4c 0009:Ret KERNEL32.LZClose() retval=00000000 ret=401c1a4c 0009:Call ntdll.RtlFreeUnicodeString(0032fb48) ret=401c1dcc 0009:Ret ntdll.RtlFreeUnicodeString() retval=00000001 ret=401c1dcc 0009:Ret version.GetFileVersionInfoA() retval=00000001 ret=6001aab5 0009:Call version.VerQueryValueA(00144718,600222cc "\\",0032fd50,0032fc40) ret=6001aadb 0009:Call KERNEL32.MultiByteToWideChar(00000000,00000000,600222cc "\\",ffffffff,00000000,00000000) ret=401c174a 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000002 ret=401c174a 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000004) ret=401c1772 0009:Ret ntdll.RtlAllocateHeap() retval=00142ff8 ret=401c1772 0009:Call KERNEL32.MultiByteToWideChar(00000000,00000000,600222cc "\\",ffffffff,00142ff8,00000002) ret=401c17aa 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000002 ret=401c17aa 0009:Call ntdll.RtlFreeHeap(00110000,00000000,00142ff8) ret=401c17e0 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c17e0 0009:Ret version.VerQueryValueA() retval=00000001 ret=6001aadb 0009:Call version.VerQueryValueA(00144718,600222a4 "\\StringFileInfo\\040904B0\\ProductVersion",0032fd50,0032fc40) ret=6001ab36 0009:Call KERNEL32.MultiByteToWideChar(00000000,00000000,600222a4 "\\StringFileInfo\\040904B0\\ProductVersion",ffffffff,00000000,00000000) ret=401c174a 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000028 ret=401c174a 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000050) ret=401c1772 0009:Ret ntdll.RtlAllocateHeap() retval=00142ff8 ret=401c1772 0009:Call KERNEL32.MultiByteToWideChar(00000000,00000000,600222a4 "\\StringFileInfo\\040904B0\\ProductVersion",ffffffff,00142ff8,00000028) ret=401c17aa 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000028 ret=401c17aa 0009:Call ntdll.RtlFreeHeap(00110000,00000000,00142ff8) ret=401c17e0 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c17e0 0009:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00144a30 L"1.0.5",ffffffff,00144dbc,00000070,00000000,00000000) ret=401c1870 0009:Ret KERNEL32.WideCharToMultiByte() retval=00000006 ret=401c1870 0009:Ret version.VerQueryValueA() retval=00000001 ret=6001ab36 0009:Call version.VerQueryValueA(00144718,60022278 "\\StringFileInfo\\040904B0\\OriginalFileName",0032fd50,0032fc40) ret=6001ab7a 0009:Call KERNEL32.MultiByteToWideChar(00000000,00000000,60022278 "\\StringFileInfo\\040904B0\\OriginalFileName",ffffffff,00000000,00000000) ret=401c174a 0009:Ret KERNEL32.MultiByteToWideChar() retval=0000002a ret=401c174a 0009:Call ntdll.RtlAllocateHeap(00110000,00000000,00000054) ret=401c1772 0009:Ret ntdll.RtlAllocateHeap() retval=00142ff8 ret=401c1772 0009:Call KERNEL32.MultiByteToWideChar(00000000,00000000,60022278 "\\StringFileInfo\\040904B0\\OriginalFileName",ffffffff,00142ff8,0000002a) ret=401c17aa 0009:Ret KERNEL32.MultiByteToWideChar() retval=0000002a ret=401c17aa 0009:Call ntdll.RtlFreeHeap(00110000,00000000,00142ff8) ret=401c17e0 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c17e0 0009:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00144990 L"ijl10.dll",ffffffff,00144d1c,00000110,00000000,00000000) ret=401c1870 0009:Ret KERNEL32.WideCharToMultiByte() retval=0000000a ret=401c1870 0009:Ret version.VerQueryValueA() retval=00000001 ret=6001ab7a 0009:Call KERNEL32.LocalFree(00144718) ret=6001ac63 0009:Ret KERNEL32.LocalFree() retval=00000000 ret=6001ac63 0009:Ret PE DLL (proc=0x6001ffd0,module=0x60000000 L"ijl10.dll",reason=PROCESS_ATTACH,res=0x1) retval=1 0009:Starting process L"C:\\Sierra\\Master of Olympus - Zeus\\Zeus.exe" (entryproc=0x1419d12) 0009:Call KERNEL32.GetVersion() ret=01419d3e 0009:Ret KERNEL32.GetVersion() retval=0a280105 ret=01419d3e 0009:Call KERNEL32.HeapCreate(00000001,00001000,00000000) ret=01419e51 0009:Ret KERNEL32.HeapCreate() retval=0166c000 ret=01419e51 0009:Call ntdll.RtlAllocateHeap(0166c000,00000000,00000140) ret=01419e89 0009:Ret ntdll.RtlAllocateHeap() retval=0166c138 ret=01419e89 0009:Call ntdll.RtlAllocateHeap(0166c000,00000008,000041c4) ret=0141a575 0009:Ret ntdll.RtlAllocateHeap() retval=0166c280 ret=0141a575 0009:Call KERNEL32.VirtualAlloc(00000000,00100000,00002000,00000004) ret=0141a58f 0009:Ret KERNEL32.VirtualAlloc() retval=01780000 ret=0141a58f 0009:Call KERNEL32.VirtualAlloc(01780000,00008000,00001000,00000004) ret=0141a61b 0009:Ret KERNEL32.VirtualAlloc() retval=01780000 ret=0141a61b 0009:Call KERNEL32.GetStartupInfoA(0032fe5c) ret=0141bf57 0009:Ret KERNEL32.GetStartupInfoA() retval=0032fe5c ret=0141bf57 0009:Call KERNEL32.GetStdHandle(fffffff6) ret=0141c056 0009:Ret KERNEL32.GetStdHandle() retval=00000004 ret=0141c056 0009:Call KERNEL32.GetFileType(00000004) ret=0141c064 0009:Ret KERNEL32.GetFileType() retval=00000002 ret=0141c064 0009:Call KERNEL32.GetStdHandle(fffffff5) ret=0141c056 0009:Ret KERNEL32.GetStdHandle() retval=00000008 ret=0141c056 0009:Call KERNEL32.GetFileType(00000008) ret=0141c064 0009:Ret KERNEL32.GetFileType() retval=00000001 ret=0141c064 0009:Call KERNEL32.GetStdHandle(fffffff4) ret=0141c056 0009:Ret KERNEL32.GetStdHandle() retval=0000000c ret=0141c056 0009:Call KERNEL32.GetFileType(0000000c) ret=0141c064 0009:Ret KERNEL32.GetFileType() retval=00000001 ret=0141c064 0009:Call KERNEL32.SetHandleCount(00000020) ret=0141c09b 0009:Ret KERNEL32.SetHandleCount() retval=00000020 ret=0141c09b 0009:Call KERNEL32.GetCommandLineA() ret=01419d8c 0009:Ret KERNEL32.GetCommandLineA() retval=001430d0 ret=01419d8c 0009:Call KERNEL32.GetEnvironmentStringsW() ret=0141bde3 0009:Ret KERNEL32.GetEnvironmentStringsW() retval=00220000 ret=0141bde3 0009:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00220000 L"DYLD_FALLBACK_LIBRARY_PATH=/opt/local/lib",0000062c,00000000,00000000,00000000,00000000) ret=0141be5b 0009:Ret KERNEL32.WideCharToMultiByte() retval=0000062c ret=0141be5b 0009:Call ntdll.RtlAllocateHeap(0166c000,00000000,00000630) ret=01419389 0009:Ret ntdll.RtlAllocateHeap() retval=01670450 ret=01419389 0009:Call KERNEL32.WideCharToMultiByte(00000000,00000000,00220000 L"DYLD_FALLBACK_LIBRARY_PATH=/opt/local/lib",0000062c,01670450,0000062c,00000000,00000000) ret=0141be7d 0009:Ret KERNEL32.WideCharToMultiByte() retval=0000062c ret=0141be7d 0009:Call KERNEL32.FreeEnvironmentStringsW(00220000) ret=0141be9a 0009:Ret KERNEL32.FreeEnvironmentStringsW() retval=00000001 ret=0141be9a 0009:Call KERNEL32.GetACP() ret=0141d995 0009:Ret KERNEL32.GetACP() retval=000004e4 ret=0141d995 0009:Call KERNEL32.GetCPInfo(000004e4,0032fe60) ret=0141d9d2 0009:Ret KERNEL32.GetCPInfo() retval=00000001 ret=0141d9d2 0009:Call KERNEL32.GetCPInfo(000004e4,0032fe38) ret=0141dbdd 0009:Ret KERNEL32.GetCPInfo() retval=00000001 ret=0141dbdd 0009:Call KERNEL32.GetStringTypeW(00000001,01440f08 L"",00000001,0032f8f4) ret=0141df33 0009:Ret KERNEL32.GetStringTypeW() retval=00000001 ret=0141df33 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fd38 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,00000000,00000000) ret=0141dfb9 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=0141dfb9 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fd38 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,0032f6dc,00000100) ret=0141e00f 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=0141e00f 0009:Call KERNEL32.GetStringTypeW(00000001,0032f6dc L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032f938) ret=0141e021 0009:Ret KERNEL32.GetStringTypeW() retval=00000001 ret=0141e021 0009:Call KERNEL32.LCMapStringW(00000000,00000100,01440f08 L"",00000001,00000000,00000000) ret=0141e07f 0009:Ret KERNEL32.LCMapStringW() retval=00000001 ret=0141e07f 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fd38 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,00000000,00000000) ret=0141e11c 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=0141e11c 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fd38 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,0032f6b8,00000100) ret=0141e174 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=0141e174 0009:Call KERNEL32.LCMapStringW(00000000,00000100,0032f6b8 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,00000000,00000000) ret=0141e18a 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=0141e18a 0009:Call KERNEL32.LCMapStringW(00000000,00000100,0032f6b8 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032f4b8,00000100) ret=0141e225 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=0141e225 0009:Call KERNEL32.WideCharToMultiByte(000004e4,00000220,0032f4b8 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@abcdefghijklmnopqrstuvwxyz[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0161"...,00000100,0032fc38,00000100,00000000,00000000) ret=0141e24a 0009:Ret KERNEL32.WideCharToMultiByte() retval=00000100 ret=0141e24a 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fd38 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,00000000,00000000) ret=0141e11c 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=0141e11c 0009:Call KERNEL32.MultiByteToWideChar(000004e4,00000001,0032fd38 " \x01\x02\x03\x04\x05\x06\x07\x08\t\n\x0b\x0c\r\x0e\x0f\x10\x11\x12\x13\x14\x15\x16\x17\x18\x19\x1a\x1b\x1c\x1d\x1e\x1f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\x7f\x80\x81\x82\x83\x84\x85\x86\x87\x88\x89\x8a\x8b\x8c\x8d\x8e\x8f\x90\x91\x92\x93\x94"...,00000100,0032f698,00000100) ret=0141e174 0009:Ret KERNEL32.MultiByteToWideChar() retval=00000100 ret=0141e174 0009:Call KERNEL32.LCMapStringW(00000000,00000200,0032f698 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,00000000,00000000) ret=0141e18a 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=0141e18a 0009:Call KERNEL32.LCMapStringW(00000000,00000200,0032f698 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`abcdefghijklmnopqrstuvwxyz{|}~\007f\20ac\0081\201a\0192\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032f498,00000100) ret=0141e225 0009:Ret KERNEL32.LCMapStringW() retval=00000100 ret=0141e225 0009:Call KERNEL32.WideCharToMultiByte(000004e4,00000220,0032f498 L" \0001\0002\0003\0004\0005\0006\0007\0008\t\n\000b\000c\r\000e\000f\0010\0011\0012\0013\0014\0015\0016\0017\0018\0019\001a\001b\001c\001d\001e\001f !\"#$%&'()*+,-./0123456789:;<=>?@ABCDEFGHIJKLMNOPQRSTUVWXYZ[\\]^_`ABCDEFGHIJKLMNOPQRSTUVWXYZ{|}~\007f\20ac\0081\201a\0191\201e\2026\2020\2021\02c6\2030\0160"...,00000100,0032fb38,00000100,00000000,00000000) ret=0141e24a 0009:Ret KERNEL32.WideCharToMultiByte() retval=00000100 ret=0141e24a 0009:Call KERNEL32.GetModuleFileNameA(00000000,01441134,00000104) ret=0141bba2 0009:Ret KERNEL32.GetModuleFileNameA() retval=0000002b ret=0141bba2 0009:Call ntdll.RtlFreeHeap(0166c000,00000000,01670450) ret=01419315 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=01419315 0009:Call KERNEL32.GetModuleHandleA(01440b04 "KERNEL32") ret=0141aa2b 0009:Ret KERNEL32.GetModuleHandleA() retval=7b810000 ret=0141aa2b 0009:Call KERNEL32.GetProcAddress(7b810000,01440ae8 "IsProcessorFeaturePresent") ret=0141aa3b 0009:Ret KERNEL32.GetProcAddress() retval=7b8165d0 ret=0141aa3b 0009:Call KERNEL32.IsProcessorFeaturePresent(00000000) ret=0141aa43 0009:Ret KERNEL32.IsProcessorFeaturePresent() retval=00000000 ret=0141aa43 0009:Call ntdll.RtlAllocateHeap(0166c000,00000008,00000800) ret=0141ecc9 0009:Ret ntdll.RtlAllocateHeap() retval=01670450 ret=0141ecc9 0009:Call KERNEL32.LoadLibraryA(0143f650 "user32.dll") ret=01413531 0009:Ret KERNEL32.LoadLibraryA() retval=40610000 ret=01413531 0009:Call KERNEL32.GetProcAddress(40610000,0143f65c "MessageBoxA") ret=01413547 0009:Ret KERNEL32.GetProcAddress() retval=40618e54 ret=01413547 0009:Call KERNEL32.LoadLibraryA(01443500 "winmm.dll") ret=014135cf 0009:Ret KERNEL32.LoadLibraryA() retval=42c90000 ret=014135cf 0009:Call KERNEL32.GetProcAddress(42c90000,01443500 "timeGetTime") ret=0141365d 0009:Ret KERNEL32.GetProcAddress() retval=7b815ec8 ret=0141365d 0009:Call KERNEL32.GetProcAddress(42c90000,0143f680 "timeSetEvent") ret=01413673 0009:Ret KERNEL32.GetProcAddress() retval=42c9fe14 ret=01413673 0009:Call KERNEL32.LoadLibraryA(0143f690 "kernel32.dll") ret=01413683 0009:Ret KERNEL32.LoadLibraryA() retval=7b810000 ret=01413683 0009:Call KERNEL32.GetProcAddress(7b810000,01443500 "ReadProcessMemory") ret=01413711 0009:Ret KERNEL32.GetProcAddress() retval=7b817080 ret=01413711 0009:Call KERNEL32.GetProcAddress(7b810000,01443500 "WriteProcessMemory") ret=0141379f 0009:Ret KERNEL32.GetProcAddress() retval=7b818208 ret=0141379f 0009:Call KERNEL32.GetProcAddress(7b810000,01443500 "VirtualProtect") ret=0141382d 0009:Ret KERNEL32.GetProcAddress() retval=7b817e90 ret=0141382d 0009:Call KERNEL32.GetProcAddress(7b810000,01443500 "GetLocalTime") ret=014138bb 0009:Ret KERNEL32.GetProcAddress() retval=7b8155c8 ret=014138bb 0009:Call KERNEL32.GetProcAddress(7b810000,01443500 "DeviceIoControl") ret=01413949 0009:Ret KERNEL32.GetProcAddress() retval=7b8143f8 ret=01413949 0009:Call KERNEL32.GetProcAddress(7b810000,0143f6f8 "CreateEventA") ret=01413960 0009:Ret KERNEL32.GetProcAddress() retval=7b813e88 ret=01413960 0009:Call KERNEL32.GetProcAddress(7b810000,0143f708 "CreateMutexA") ret=01413977 0009:Ret KERNEL32.GetProcAddress() retval=7b814038 ret=01413977 0009:Call KERNEL32.GetProcAddress(7b810000,0143f718 "GetLastError") ret=0141398d 0009:Ret KERNEL32.GetProcAddress() retval=7b8155b0 ret=0141398d 0009:Call KERNEL32.GetProcAddress(7b810000,0143f728 "CloseHandle") ret=014139a4 0009:Ret KERNEL32.GetProcAddress() retval=7b813c00 ret=014139a4 0009:Call KERNEL32.GetProcAddress(7b810000,0143f734 "WaitForSingleObject") ret=014139bb 0009:Ret KERNEL32.GetProcAddress() retval=7b817f80 ret=014139bb 0009:Call KERNEL32.GetProcAddress(7b810000,0143f748 "GetCurrentProcess") ret=014139d1 0009:Ret KERNEL32.GetProcAddress() retval=7b815190 ret=014139d1 0009:Call KERNEL32.GetProcAddress(7b810000,0143f75c "GetCurrentThread") ret=014139e8 0009:Ret KERNEL32.GetProcAddress() retval=7b8151c0 ret=014139e8 0009:Call KERNEL32.GetProcAddress(7b810000,0143f770 "GetCurrentProcessId") ret=014139ff 0009:Ret KERNEL32.GetProcAddress() retval=7b8151a8 ret=014139ff 0009:Call KERNEL32.GetProcAddress(7b810000,0143f784 "GetVersion") ret=01413a15 0009:Ret KERNEL32.GetProcAddress() retval=7b815fa0 ret=01413a15 0009:Call KERNEL32.GetProcAddress(7b810000,0143f790 "SetUnhandledExceptionFilter") ret=01413a2c 0009:Ret KERNEL32.GetProcAddress() retval=7b8179e0 ret=01413a2c 0009:Call KERNEL32.GetProcAddress(7b810000,0143f7ac "GetModuleHandleA") ret=01413a43 0009:Ret KERNEL32.GetProcAddress() retval=7b8156d0 ret=01413a43 0009:Call KERNEL32.GetProcAddress(7b810000,0143f7c0 "FreeLibrary") ret=01413a59 0009:Ret KERNEL32.GetProcAddress() retval=7b814ce0 ret=01413a59 0009:Call KERNEL32.GetProcAddress(7b810000,0143f7cc "ReleaseMutex") ret=01413a70 0009:Ret KERNEL32.GetProcAddress() retval=7b817128 ret=01413a70 0009:Call KERNEL32.GetProcAddress(7b810000,0143f7dc "CreateFileA") ret=01413a87 0009:Ret KERNEL32.GetProcAddress() retval=7b813f18 ret=01413a87 0009:Call KERNEL32.GetProcAddress(7b810000,0143f7e8 "SetFileAttributesA") ret=01413a9d 0009:Ret KERNEL32.GetProcAddress() retval=7b817650 ret=01413a9d 0009:Call KERNEL32.GetProcAddress(7b810000,0143f7fc "GetCommandLineA") ret=01413ab4 0009:Ret KERNEL32.GetProcAddress() retval=7b814ed8 ret=01413ab4 0009:Call KERNEL32.GetProcAddress(7b810000,0143f80c "GetModuleFileNameA") ret=01413acb 0009:Ret KERNEL32.GetProcAddress() retval=7b8156a0 ret=01413acb 0009:Call KERNEL32.GetProcAddress(7b810000,0143f820 "GetFileSize") ret=01413ae1 0009:Ret KERNEL32.GetProcAddress() retval=7b8154a8 ret=01413ae1 0009:Call KERNEL32.GetProcAddress(7b810000,0143f82c "ReadFile") ret=01413af8 0009:Ret KERNEL32.GetProcAddress() retval=7b817038 ret=01413af8 0009:Call KERNEL32.GetProcAddress(7b810000,0143f838 "WriteFile") ret=01413b0f 0009:Ret KERNEL32.GetProcAddress() retval=7b818130 ret=01413b0f 0009:Call KERNEL32.GetProcAddress(7b810000,0143f844 "FlushFileBuffers") ret=01413b25 0009:Ret KERNEL32.GetProcAddress() retval=7b814bf0 ret=01413b25 0009:Call KERNEL32.GetProcAddress(7b810000,0143f858 "SetFilePointer") ret=01413b3c 0009:Ret KERNEL32.GetProcAddress() retval=7b817680 ret=01413b3c 0009:Call KERNEL32.GetProcAddress(7b810000,0143f868 "GetSystemDirectoryA") ret=01413b53 0009:Ret KERNEL32.GetProcAddress() retval=7b815c40 ret=01413b53 0009:Call KERNEL32.GetProcAddress(7b810000,0143f87c "GetDiskFreeSpaceA") ret=01413b69 0009:Ret KERNEL32.GetProcAddress() retval=7b815280 ret=01413b69 0009:Call KERNEL32.GetProcAddress(7b810000,0143f890 "GetDriveTypeA") ret=01413b80 0009:Ret KERNEL32.GetProcAddress() retval=7b815310 ret=01413b80 0009:Call KERNEL32.GetProcAddress(7b810000,0143f8a0 "EnterCriticalSection") ret=01413b97 0009:Ret KERNEL32.GetProcAddress() retval=7bc28470 ret=01413b97 0009:Call KERNEL32.GetProcAddress(7b810000,0143f8b8 "LeaveCriticalSection") ret=01413bad 0009:Ret KERNEL32.GetProcAddress() retval=7bc27d00 ret=01413bad 0009:Call KERNEL32.GetProcAddress(7b810000,0143f8d0 "InitializeCriticalSection") ret=01413bc4 0009:Ret KERNEL32.GetProcAddress() retval=7b8163f0 ret=01413bc4 0009:Call KERNEL32.GetCurrentProcess() ret=01413c03 0009:Ret KERNEL32.GetCurrentProcess() retval=ffffffff ret=01413c03 0009:Call KERNEL32.GetCurrentProcessId() ret=01413c0e 0009:Ret KERNEL32.GetCurrentProcessId() retval=00000008 ret=01413c0e 0009:Call KERNEL32.CreateMutexA(00000000,00000000,01443500 "CMS32_MUTEX") ret=01413c9a 0009:Ret KERNEL32.CreateMutexA() retval=00000060 ret=01413c9a 0009:Call KERNEL32.GetLastError() ret=01413cb5 0009:Ret KERNEL32.GetLastError() retval=00000000 ret=01413cb5 0009:trace:seh:raise_exception code=80000004 flags=0 addr=0x1413d9d ip=01413d9d tid=0009 0009:trace:seh:raise_exception eax=0140e0b0 ebx=7b84c931 ecx=0032f6b8 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00000202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=80000004 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=80000004 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=80000004 flags=0 addr=0x1413d9f ip=01413d9f tid=0009 0009:trace:seh:raise_exception eax=0140e0b0 ebx=7b84c931 ecx=0032f6b8 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6bc cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00000202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=80000004 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=80000004 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=80000004 flags=0 addr=0x1413da5 ip=01413da5 tid=0009 0009:trace:seh:raise_exception eax=0140e0b0 ebx=7b84c931 ecx=00000060 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6bc cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00000202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=80000004 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=80000004 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=80000004 flags=0 addr=0x1413da6 ip=01413da6 tid=0009 0009:trace:seh:raise_exception eax=0140e0b0 ebx=7b84c931 ecx=00000060 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6b8 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00000202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=80000004 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=80000004 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=80000004 flags=0 addr=0x7b817f80 ip=7b817f80 tid=0009 0009:trace:seh:raise_exception eax=0140e0b0 ebx=7b84c931 ecx=00000060 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6b4 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00000202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=80000004 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=80000004 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:Call KERNEL32.WaitForSingleObject(00000060,ffffffff) ret=01413dac 0009:Ret KERNEL32.WaitForSingleObject() retval=00000000 ret=01413dac 0009:Call KERNEL32.ReadProcessMemory(ffffffff,0141900d,0032fa78,00000004,0032fa08) ret=0140e0a5 0009:Ret KERNEL32.ReadProcessMemory() retval=00000001 ret=0140e0a5 0009:Call ntdll.RtlAllocateHeap(0166c000,00000000,00005000) ret=01419389 0009:Ret ntdll.RtlAllocateHeap() retval=01670c58 ret=01419389 0009:Call KERNEL32.ReadProcessMemory(ffffffff,00582000,01670c58,00005000,0032fa08) ret=0140e0a5 0009:Ret KERNEL32.ReadProcessMemory() retval=00000001 ret=0140e0a5 0009:Call KERNEL32.WriteProcessMemory(ffffffff,00582000,01670c58,00005000,0032fa08) ret=01413f75 0009:Ret KERNEL32.WriteProcessMemory() retval=00000001 ret=01413f75 0009:Call ntdll.RtlFreeHeap(0166c000,00000000,01670c58) ret=01419315 0009:Ret ntdll.RtlFreeHeap() retval=00000001 ret=01419315 0009:Call KERNEL32.ReadProcessMemory(ffffffff,0141900d,0032fa78,00000004,0032fa08) ret=0140e0a5 0009:Ret KERNEL32.ReadProcessMemory() retval=00000001 ret=0140e0a5 0009:Call ntdll.RtlAllocateHeap(0166c000,00000000,00001000) ret=01419389 0009:Ret ntdll.RtlAllocateHeap() retval=01670c58 ret=01419389 0009:Call KERNEL32.ReadProcessMemory(ffffffff,00584000,01670c58,00001000,0032fa08) ret=0140e0a5 0009:Ret KERNEL32.ReadProcessMemory() retval=00000001 ret=0140e0a5 0009:Call ntdll.RtlAllocateHeap(0166c000,00000000,00004a00) ret=01419389 0009:Ret ntdll.RtlAllocateHeap() retval=01671c60 ret=01419389 0009:Call KERNEL32.ReadProcessMemory(ffffffff,0140eb00,01671c60,000049f6,0032fa08) ret=0140e0a5 0009:Ret KERNEL32.ReadProcessMemory() retval=00000001 ret=0140e0a5 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010202 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000094 flags=0 addr=0x14140d6 ip=014140d6 tid=0009 0009:trace:seh:raise_exception eax=0000000c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000094 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000094 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=c0000005 flags=0 addr=0x14141dd ip=014141dd tid=0009 0009:trace:seh:raise_exception info[0]=00000001 0009:trace:seh:raise_exception info[1]=00000000 0009:trace:seh:raise_exception eax=00000000 ebx=7b84c931 ecx=00000000 edx=0178042c esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00010216 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c0000005 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c0000005 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=80000004 flags=0 addr=0x14141e0 ip=014141e0 tid=0009 0009:trace:seh:raise_exception eax=0144348c ebx=7b84c931 ecx=00000000 edx=0178042c esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00000216 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=80000004 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=80000004 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0009:trace:seh:raise_exception code=80000004 flags=0 addr=0x14141e6 ip=014141e6 tid=0009 0009:trace:seh:raise_exception eax=0144348c ebx=7b84c931 ecx=00000000 edx=00000000 esi=7ffdf000 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00000216 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=80000004 flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=80000004 flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 0 0015:Call PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_DETACH,res=0x0) 0015:Call ntdll.RtlDeleteCriticalSection(00118090) ret=40657eb9 0015:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=40657eb9 0015:Call ntdll.RtlFreeHeap(00110000,00000000,00118088) ret=40657ef9 0015:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40657ef9 0015:Ret PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_DETACH,res=0x0) retval=1 0016:Call PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_DETACH,res=0x0) 0016:Call ntdll.RtlDeleteCriticalSection(00117ec0) ret=40657eb9 0016:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=40657eb9 0016:Call ntdll.RtlFreeHeap(00110000,00000000,00117eb8) ret=40657ef9 0016:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40657ef9 0016:Ret PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=THREAD_DETACH,res=0x0) retval=1 0009:trace:seh:raise_exception code=c000013a flags=0 addr=0x1414236 ip=01414236 tid=0009 0009:trace:seh:raise_exception eax=014f86b7 ebx=7b84c931 ecx=00000050 edx=00000042 esi=00000050 edi=01419d12 0009:trace:seh:raise_exception ebp=0032fe90 esp=0032f6c0 cs=0017 ds=001f es=001f fs=1007 gs=0037 flags=00000206 0009:trace:seh:call_vectored_handlers calling handler at 0x4337bc30 code=c000013a flags=0 0009:trace:seh:call_vectored_handlers handler at 0x4337bc30 returned 0 0009:trace:seh:call_stack_handlers calling handler at 0x140e0c0 code=c000013a flags=0 0009:trace:seh:call_stack_handlers handler at 0x140e0c0 returned 1 0009:trace:seh:call_stack_handlers calling handler at 0x141c19c code=c000013a flags=0 0009:Call KERNEL32.UnhandledExceptionFilter(0032ec40) ret=0141ba7a 000f:Ret KERNEL32.WaitForSingleObjectEx() retval=00000000 ret=401c0e6c =PROCESS_DETACH,res=0x1) 000f:Call KERNEL32.CloseHandle(00000048) ret=401c0ee8 user32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0012:Call PE DLL (proc=0x42dcc1e0,module=0x42d60000 L"winex11.drv",reason=PROCESS_DETACH,res=0x1) 000f:Ret KERNEL32.CloseHandle() retval=00000001 ret=401c0ee8 000f:Call advapi32.RegCloseKey(0000001c) ret=401c4207 0012:Ret PE DLL (proc=0x42dcc1e0,module=0x42d60000 L"winex11.drv",reason=PROCESS_DETACH,res=0x1) retval=1 5020) ret=401c4215 000f:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=401c4215 PROCESS_DETACH,res=0x1) 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00115010) ret=401c4235 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=401c4235 000f:Call KERNEL32.ExitProcess(00000000) ret=401cca50 000f:Call PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=PROCESS_DETACH,res=0x1) 0012:Ret PE DLL (proc=0x42f82bb0,module=0x42f70000 L"imm32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0012:Call PE DLL (proc=0x407b9de0,module=0x40760000 L"gdi32.dll",reason=PROCESS_DETACH,res=0x1) 0012:Ret PE DLL (proc=0x407b9de0,module=0x40760000 L"gdi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0012:Call PE DLL (proc=0x4071d2f0,module=0x406d0000 L"rpcrt4.dll",reason=PROCESS_DETACH,res=0x1) 0012:Ret PE DLL (proc=0x4071d2f0,module=0x406d0000 L"rpcrt4.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0012:Call PE DLL (proc=0x40691570,module=0x40680000 L"ntoskrnl.exe",reason=PROCESS_DETACH,res=0x1) 000f:Call KERNEL32.SetEvent(00000020) ret=406505e4 0012:Call ntdll.RtlRemoveVectoredExceptionHandler(00114f58) ret=4068f7a3 0012:Ret ntdll.RtlRemoveVectoredExceptionHandler() retval=00000001 ret=4068f7a3 0012:Ret PE DLL (proc=0x40691570,module=0x40680000 L"ntoskrnl.exe",reason=PROCESS_DETACH,res=0x1) retval=1 0010:Ret KERNEL32.WaitForMultipleObjectsEx() retval=00000000 ret=40653064 PROCESS_DETACH,res=0x1) 0012:Ret PE DLL (proc=0x4064ac90,module=0x40610000 L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0012:Call PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_DETACH,res=0x1) 0010:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40652426 0010:Call KERNEL32.FlushFileBuffers(00000044) ret=40651be9 0012:Ret PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0012:Call PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) 0012:Ret PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) retval=1 0010:Ret KERNEL32.FlushFileBuffers() retval=00000001 ret=40651be9 0010:Call KERNEL32.CloseHandle(00000044) ret=40651bf7 000f:Ret KERNEL32.SetEvent() retval=00000001 ret=406505e4 000f:Call KERNEL32.WaitForSingleObject(00000030,ffffffff) ret=4064b4ea 0010:Ret KERNEL32.CloseHandle() retval=00000001 ret=40651bf7 0010:Call KERNEL32.CloseHandle(0000004c) ret=40651c13 0010:Ret KERNEL32.CloseHandle() retval=00000001 ret=40651c13 0010:Call KERNEL32.SetEvent(00000030) ret=4064bb09 000f:Ret KERNEL32.WaitForSingleObject() retval=00000000 ret=4064b4ea 000f:Call KERNEL32.ReleaseMutex(0000002c) ret=4064b4f8 0010:Ret KERNEL32.SetEvent() retval=00000001 ret=4064bb09 000f:Ret KERNEL32.ReleaseMutex() retval=00000001 ret=4064b4f8 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117b18) ret=40640766 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=40640766 000f:Call ntdll.RtlDeleteCriticalSection(00117ae8) ret=4064bbc6 000f:Ret ntdll.RtlDeleteCriticalSection() retval=00000000 ret=4064bbc6 000f:Call KERNEL32.CloseHandle(0000002c) ret=4064bbd4 000f:Ret KERNEL32.CloseHandle() retval=00000001 ret=4064bbd4 000f:Call KERNEL32.CloseHandle(00000030) ret=4064bbe2 000f:Ret KERNEL32.CloseHandle() retval=00000001 ret=4064bbe2 000f:Call ntdll.RtlFreeHeap(00110000,00000000,00117ad0) ret=4064bc10 000f:Ret ntdll.RtlFreeHeap() retval=00000001 ret=4064bc10 000f:Ret PE DLL (proc=0x4065a2f0,module=0x40610000 L"rpcrt4.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000f:Call PE DLL (proc=0x406d6c90,module=0x406a0000 L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) 000f:Ret PE DLL (proc=0x406d6c90,module=0x406a0000 L"advapi32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000f:Call PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_DETACH,res=0x1) 000f:Ret PE DLL (proc=0x7b86bdb0,module=0x7b810000 L"KERNEL32.dll",reason=PROCESS_DETACH,res=0x1) retval=1 000f:Call PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) 000f:Ret PE DLL (proc=0x7bc7a570,module=0x7bc10000 L"ntdll.dll",reason=PROCESS_DETACH,res=0x1) retval=1