Illegal operation:
Code: C0000005h, flags: 00000000h, address: 00007FFFB508E9DDh
Access violation, operation: read, address: FFFFFFFFFFFFFFFFh
Call path:
app_mainloop
Code bytes (00007FFFB508E9DDh):
00007FFFB508E99Dh: FF FF 48 8B C7 48 8B 0C 24 F3 0F 7E 04 24 48 8B
00007FFFB508E9ADh: 54 24 08 F3 0F 7E 4C 24 08 4C 8B 44 24 10 F3 0F
00007FFFB508E9BDh: 7E 54 24 10 4C 8B 4C 24 18 F3 0F 7E 5C 24 18 EB
00007FFFB508E9CDh: 0F 48 8B F8 48 8B C8 FF 15 7E 3C 08 00 48 8B C7
00007FFFB508E9DDh: FF D0 48 8B 75 28 48 8B 7D 30 48 8B E5 48 8B 6D
00007FFFB508E9EDh: 20 48 83 C4 38 C3 CC CC CC CC CC CC CC CC CC CC
00007FFFB508E9FDh: CC CC CC CC CC CC CC CC CC 66 66 0F 1F 84 00 00
00007FFFB508EA0Dh: 00 00 00 FF E0 CC CC CC CC CC CC CC CC CC CC CC
Registers:
RAX: 34F3EFCDAB896745, RBX: 0000002504CFDF28, RCX: 0000016E714F3350, RDX: 401800001000001A
RSI: 0000002504CFDA18, RDI: 34F3EFCDAB896745, RBP: 0000002504CFD9B0, RSP: 0000002504CFD9A0
Timestamp:
16437ms
Crash location:
Module: OLEAUT32
Offset: 1E9DDh
Symbol: "SetErrorInfo" (+E8Dh)
Stack dump analysis:
Address: 00007FFFB5081E36h (OLEAUT32+11E36h), symbol: "DispCallFunc" (+226h)
Address: 00007FFFB5081D7Fh (OLEAUT32+11D7Fh), symbol: "DispCallFunc" (+16Fh)
Address: 00007FFFB511CAE8h (OLEAUT32+ACAE8h), symbol: "VariantClear" (+17D68h)
Address: 00007FFFB507F1E5h (OLEAUT32+F1E5h), symbol: "LoadTypeLibEx" (+4BC5h)