I unzipped the file and double-clicked the exe inside.
There's no PDB in the folder, so VS hasn't loaded symbols.
I'll include the details I can give you below, but I'm not sure how helpful they are... If you want to give me the PDB, I'm happy to be more specific.
Disassembly
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26 | 000000013FE74B60 mov qword ptr [rsp+8],rcx
000000013FE74B65 sub rsp,38h
000000013FE74B69 mov rdx,qword ptr [rsp+40h]
000000013FE74B6E mov cx,1
000000013FE74B72 call 000000013FE74A50
000000013FE74B77 mov qword ptr [rsp+20h],rax
000000013FE74B7C cmp qword ptr [rsp+20h],0
000000013FE74B82 je 000000013FE74BB7
000000013FE74B84 mov rax,qword ptr [rsp+20h]
000000013FE74B89 mov rax,qword ptr [rax]
000000013FE74B8C mov qword ptr [rsp+28h],rax
000000013FE74B91 call 000000013FE73D50
000000013FE74B96 mov rax,qword ptr [rax+30h]
000000013FE74B9A mov rcx,qword ptr [rsp+28h]
> 000000013FE74B9F cmp qword ptr [rcx+78h],rax
000000013FE74BA3 jne 000000013FE74BB1
000000013FE74BA5 mov rax,qword ptr [rsp+20h]
000000013FE74BAA mov rax,qword ptr [rax]
000000013FE74BAD jmp 000000013FE74BB9
000000013FE74BAF jmp 000000013FE74BB5
000000013FE74BB1 xor eax,eax
000000013FE74BB3 jmp 000000013FE74BB9
000000013FE74BB5 jmp 000000013FE74BB9
000000013FE74BB7 xor eax,eax
000000013FE74BB9 add rsp,38h
000000013FE74BBD ret
|
Call stack
| > codeclap.exe!000000013fe74b9f() Unknown
codeclap.exe!000000013fe75176() Unknown
codeclap.exe!000000013fe764d6() Unknown
codeclap.exe!000000013fe49208() Unknown
codeclap.exe!000000013fed4548() Unknown
codeclap.exe!000000013fee0358() Unknown
kernel32.dll!00000000775d59cd() Unknown
ntdll.dll!000000007783385d() Unknown
|
Exception error
| Unhandled exception at 0x000000013FE74B9F in codeclap.exe: 0xC0000005: Access violation reading location 0x0000000000000078.
|