Code: Select all
madExcept version : 4.0.6
callstack crc : $a8b2e170, $78a36543, $78a36543
exception number : 1
exception class : EAccessViolation
exception message : Access violation at address 007A0CF0 in module 'Program.exe'. Read of address 0008D8C2.
thread $f50:
007a0cf0 +034 Program.exe madCodeHook LpcWorkerThread
004cbc51 +00d Program.exe madExcept CallThreadProcSafe
004cbcbb +037 Program.exe madExcept ThreadExceptFrame
75f61192 +010 kernel32.dll BaseThreadInitThunk
>> created by thread $a60 at:
007a0eeb +173 Program.exe madCodeHook LpcDispatchThread
main thread ($7c8):
769093f1 +00a USER32.dll WaitMessage
005b68c9 +149 Program.exe Vcl.Forms TApplication.Idle
005b5ae3 +017 Program.exe Vcl.Forms TApplication.HandleMessage
005b5e15 +0c9 Program.exe Vcl.Forms TApplication.Run
0087042d +1a9 Program.exe Program 151 +54 initialization
75f61192 +010 kernel32.dll BaseThreadInitThunk
disassembling:
007a0cbc public madCodeHook.LpcWorkerThread (Program.exe): ; function entry point
007a0cbc push ebp
007a0cbd mov ebp, esp
007a0cbf add esp, -8
007a0cc2 push ebx
007a0cc3 push esi
007a0cc4 push edi
007a0cc5 mov ebx, [ebp+8]
007a0cc8 xor eax, eax
007a0cca mov [ebp-4], eax
007a0cc8
007a0ccd loc_7a0ccd:
007a0ccd push $ffffffff
007a0ccf mov eax, [ebx+8]
007a0cd2 push eax
007a0cd3 call -$38f4b8 ($411820) ; Winapi.Windows.WaitForSingleObject (Program.exe)
007a0cd3
007a0cd8 test eax, eax
007a0cda jnz loc_7a0d6a
007a0cda
007a0ce0 cmp dword ptr [ebx+$c], 0
007a0ce4 jz loc_7a0d6a
007a0ce4
007a0cea mov eax, [ebx+$c]
007a0ced mov esi, [ebx+$c]
007a0cf0 > add eax, [esi+$20]
007a0cf3 mov edi, eax
007a0cf5 mov eax, [esi+$14]
007a0cf8 push eax
007a0cf9 mov eax, [esi+$10]
007a0cfc push eax
007a0cfd mov eax, [edi+4]
007a0d00 push eax
007a0d01 lea eax, [edi+$14]
007a0d04 push eax
007a0d05 mov eax, [esi+4]