SPDebugger/2.16.23119.A Exception Raised at 006d6e91 because ACCESS_VIOLATION (#c0000005) ->Reading 02e53000 Data Windows NT 10.0.21390 UAC: Enabled,Limited Time: 2021/7/2 04:46:01.032 Phys.Mem: 10287/16329MB PageFile: 9246/20297MB CPU : AMD 0.23.1.0 3793MHz Features:MMX SSE HT AES-NI (AMD Ryzen 5 3600X 6-Core Processor) Package:1 Node:1 Core:6 Thread:12 SSP/2.5.07 (20210629-1; Windows NT 10.0.21390) /*Cut for privacy*/ Registers: EAX 00000030 EBX 00000000 ECX 0002f8f0 EDX 02e23710 ESI 0387ec38 EDI 0387ec08 DS 002b ES 002b FS 0053 GS 002b SS/ESP/EBP 002b/0387eb50/02e236f0 CS/EIP 0023/006d6e91 EFlags 00010206 (Parity,Interrupt,Restart) Stack Dump: 006d73c5 00000030 0be1c9a0 0be1c9a0 0387eb84 00679c8a 0387ec38 0387ec08 00000030 02e236f0 00000001 00000000 00000030 0387eba8 00664d41 0be1c9a0 0387ec08 0387ec38 00000030 00000010 00000030 02e23514 0387ebc4 00664c35 00000010 0387ec08 0387ec68 0387ec38 00000030 0387ebe0 00664b03 0be1c9a0 0387ec08 0387ec68 0387ec38 00000030 0387ec70 00674c2b 0be1c9a0 0387ec08 0387ec68 0387ec38 00000030 0be4e180 02e234b0 00000004 00000000 0be22148 00000000 0be22150 00000004 376f07d2 fffffffe 0387ec64 70735274 00000000 7d514607 0387f204 00000000 00000000 00000000 01000000 00000000 00000000 CallStack Trace: 00 : 006d6e91/002d5e91 [00000030,0be1c9a0,0be1c9a0,0387eb84] @ ssp.exe (aesni_decrypt 006d6d50 libcrypto:aesni-x86.obj->0x141) 01 : 006d73c5/002d63c5 [0387ec38,0387ec08,00000030,02e236f0] @ ssp.exe (aesni_ecb_encrypt 006d7240 libcrypto:aesni-x86.obj->0x185) 02 : 00679c8a/00278c8a [0be1c9a0,0387ec08,0387ec38,00000030] @ ssp.exe (EVP_chacha20_poly1305 00679af0 f libcrypto:e_chacha20_poly1305.obj->0x19a) 03 : 00664d41/00263d41 [00000010,0387ec08,0387ec68,0387ec38] @ ssp.exe (EVP_EncryptUpdate 00664bf0 f libcrypto:evp_enc.obj->0x151) 04 : 00664c35/00263c35 [0be1c9a0,0387ec08,0387ec68,0387ec38] @ ssp.exe (EVP_EncryptUpdate 00664bf0 f libcrypto:evp_enc.obj->0x45) 05 : 00664b03/00263b03 [0be1c9a0,0387ec08,0387ec68,0387ec38] @ ssp.exe (EVP_CipherUpdate 00664ae0 f libcrypto:evp_enc.obj->0x23) 06 : 00674c2b/00273c2b [02e234b0,0be4e180,00000020,0387ed2c] @ ssp.exe (EVP_SignFinal 00674980 f libcrypto:p_sign.obj->0x2ab) 07 : 00675214/00274214 [02e234b0,0be4e180,00000020,0387ed2c] @ ssp.exe (EVP_SignFinal 00674980 f libcrypto:p_sign.obj->0x894) 08 : 00655e14/00254e14 [02e234b0,0387ed2c,00000004,00000000] @ ssp.exe (RAND_DRBG_reseed 00655d50 f libcrypto:drbg_lib.obj->0xc4) 09 : 00656191/00255191 [02e234b0,0be4e400,00000030,00000000] @ ssp.exe (RAND_DRBG_generate 00656060 f libcrypto:drbg_lib.obj->0x131) 10 : 006579e4/002569e4 [0b8f0280,0387ed58,0be4e400,00000030] @ ssp.exe (rand_drbg_get_entropy 00657930 f libcrypto:rand_lib.obj->0xb4) 11 : 00655bb2/00254bb2 [0b8f0280,00821c44,0000001c,00000020] @ ssp.exe (RAND_DRBG_instantiate 00655af0 f libcrypto:drbg_lib.obj->0xc2) 12 : 006566c0/002556c0 [02e234b0,0be1eedc,00656428,0387eda0] @ ssp.exe (RAND_DRBG_get0_master 006565b0 f libcrypto:drbg_lib.obj->0x110) 13 : 00656724/00255724 [0be1eedc,00000020,0387edb8,0073f569] @ ssp.exe (RAND_DRBG_get0_public 006566d0 f libcrypto:drbg_lib.obj->0x54) 14 : 0065848d/0025748d [0be1eedc,00000020,00000000,00000020] @ ssp.exe (RAND_bytes 00658470 f libcrypto:rand_lib.obj->0x1d) 15 : 0073f569/0033e569 [0b8d30f0,00000000,0be1eedc,00000020] @ ssp.exe (ssl_fill_hello_random 0073f4f0 f libssl:s3_lib.obj->0x79) 16 : 00742a0b/00341a0b [0b8d30f0,0387ee00,00000000,0b8d30f0] @ ssp.exe (tls_construct_client_hello 00742950 f libssl:statem_clnt.obj->0xbb) 17 : 00725e7d/00324e7d [00000001,0000014f,0b8d30f0,00000000] @ ssp.exe (ossl_statem_accept 007255d0 f libssl:statem.obj->0x8ad) 18 : 007258f5/003248f5 [ffffffff,00000000,0387ef04,0072d410] @ ssp.exe (ossl_statem_accept 007255d0 f libssl:statem.obj->0x325) 19 : 007255be/003245be [0b8d30f0,0000014f,0b8d30f0,0000014f] @ ssp.exe (ossl_statem_connect 007255b0 f libssl:statem.obj->0xe) 20 : 0072d410/0032c410 [0b8d30f0,00000017,0b8cf618,0000014f] @ ssp.exe (ssl3_write_bytes 0072d360 f libssl:rec_layer_s3.obj->0xb0) 21 : 0073f2cc/0033e2cc [0b8d30f0,0b8cf618,0000014f,0387efa0] @ ssp.exe (ssl3_write 0073f290 f libssl:s3_lib.obj->0x3c) 22 : 00720999/0031f999 [0b8d30f0,0b8cf618,0000014f,0387efa0] @ ssp.exe (ssl_write_internal 007208b0 f libssl:ssl_lib.obj->0xe9) 23 : 007209e8/0031f9e8 [0b8d30f0,0b8cf618,0000014f,0387efa0] @ ssp.exe (SSL_write_ex 007209d0 f libssl:ssl_lib.obj->0x18) 24 : 0047bfaf/0007afaf [0b8cf618,0000014f,00000000,00000000] @ ssp.exe (JSocket::send_wrapper->0x9f) 25 : 0047d20c/0007c20c [0b8cf618,0000014f,0be1a508,0387f4f8] @ ssp.exe (JSocket::Send->0x3c) 26 : 004fb052/000fa052 [0b875c38,0be4f958,00000000,00000001] @ ssp.exe (SPHttp::RealRead->0xcb2) 27 : 004f9dfd/000f8dfd [0b875c38,0be4f958,0be21c24,00000001] @ ssp.exe (SPHttp::Read->0x8d) 28 : 004f9d26/000f8d26 [0b875c38,ffffffff,0be21c24,00000001] @ ssp.exe (SPHttp::ReadSimple->0x196) 29 : 004f9b67/000f8b67 [0b875c38,0be1ad28,0be21c24,00000001] @ ssp.exe (SPHttp::ReadSimple->0x97) 30 : 004d2692/000d1692 [0be21ba8,02eee9ec,02eee9d0,0387fefc] @ ssp.exe (SPGhost::Execute_HTTP_RSS_Get_Thread->0x302) 31 : 004d3c83/000d2c83 [0be21ba8,02eee9ec,0387ff2c,0055da2c] @ ssp.exe (SPCmdNotifier::SPCmdNotifier->0x63) 32 : 0055dbe4/0015cbe4 [0be21ba8,00780994,0b8628b0,0b8628b0] @ ssp.exe (SPSTMThreadDescProc::Execute->0x14) 33 : 0055da2c/0015ca2c [02ebee14,00000001,0387ff74,00780a15] @ ssp.exe (SPSimpleThreadManager::BeginThreadProcShared->0xac) 34 : 0055db33/0015cb33 [02eee9d0,00780994,00780994,0b8628b0] @ ssp.exe (SPSimpleThreadManager::BeginThreadProcNormal->0x13) 35 : 00780a15/0037fa15 [0b8628b0,76536720,0387ffdc,77858acf] @ ssp.exe (_beginthread 0078091d f libcmt:thread.obj->0xf8) 36 : 76536739/00006739 [0b8628b0,6aa5dd9e,00000000,00000000] @ KERNEL32.DLL (BaseThreadInitThunk->0x19) 37 : 77858acf/00067acf [ffffffff,778882a8,00000000,00000000] @ ntdll.dll (RtlGetFullPathName_UEx->0x4bf) 38 : 77858a9d/00067a9d [00780994,0b8628b0,00000000,00905a4d] @ ntdll.dll (RtlGetFullPathName_UEx->0x48d) Total StackDepth : 39