Microsoft (R) Windows Debugger Version 10.0.22473.1005 X86 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: C:\Program Files (x86)\KDataScope-GER\KDataScope.exe ************* Path validation summary ************** Response Time (ms) Location Deferred srv* Symbol search path is: srv* Executable search path is: ModLoad: 00400000 00578000 image00400000 ModLoad: 77140000 772e3000 ntdll.dll ModLoad: 76760000 76850000 C:\WINDOWS\SysWOW64\KERNEL32.DLL ModLoad: 758e0000 75af4000 C:\WINDOWS\SysWOW64\KERNELBASE.dll ModLoad: 76ed0000 77070000 C:\WINDOWS\SysWOW64\USER32.dll ModLoad: 75590000 755a8000 C:\WINDOWS\SysWOW64\win32u.dll ModLoad: 66f90000 673e6000 C:\WINDOWS\SysWOW64\WININET.dll ModLoad: 766a0000 7675f000 C:\WINDOWS\SysWOW64\msvcrt.dll ModLoad: 758b0000 758d4000 C:\WINDOWS\SysWOW64\GDI32.dll ModLoad: 76300000 763de000 C:\WINDOWS\SysWOW64\gdi32full.dll ModLoad: 75d50000 75dca000 C:\WINDOWS\SysWOW64\advapi32.dll ModLoad: 756a0000 7571b000 C:\WINDOWS\SysWOW64\msvcp_win.dll ModLoad: 75b00000 75b75000 C:\WINDOWS\SysWOW64\sechost.dll ModLoad: 75dd0000 75ef0000 C:\WINDOWS\SysWOW64\ucrtbase.dll ModLoad: 77070000 7712f000 C:\WINDOWS\SysWOW64\RPCRT4.dll ModLoad: 75720000 757cf000 C:\WINDOWS\SysWOW64\COMDLG32.dll ModLoad: 76020000 762a1000 C:\WINDOWS\SysWOW64\combase.dll ModLoad: 74ff0000 74ff6000 C:\WINDOWS\SysWOW64\MSIMG32.dll ModLoad: 755b0000 75637000 C:\WINDOWS\SysWOW64\shcore.dll ModLoad: 76e80000 76ec5000 C:\WINDOWS\SysWOW64\SHLWAPI.dll ModLoad: 76850000 76e06000 C:\WINDOWS\SysWOW64\SHELL32.dll ModLoad: 754a0000 75583000 C:\WINDOWS\SysWOW64\ole32.dll ModLoad: 66f00000 66f8d000 C:\WINDOWS\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_5.82.19041.1110_none_c0da534e38c01f4d\COMCTL32.dll ModLoad: 73780000 737f2000 C:\WINDOWS\SysWOW64\WINSPOOL.DRV ModLoad: 75c50000 75ce6000 C:\WINDOWS\SysWOW64\OLEAUT32.dll ModLoad: 6bfd0000 6bffc000 C:\WINDOWS\SysWOW64\oledlg.dll ModLoad: 76e10000 76e73000 C:\WINDOWS\SysWOW64\WS2_32.dll ModLoad: 75440000 75487000 C:\WINDOWS\SysWOW64\WINTRUST.dll ModLoad: 75000000 7543c000 C:\WINDOWS\SysWOW64\SETUPAPI.dll ModLoad: 762c0000 762fb000 C:\WINDOWS\SysWOW64\cfgmgr32.dll ModLoad: 76680000 76699000 C:\WINDOWS\SysWOW64\bcrypt.dll (52d0.49b0): Break instruction exception - code 80000003 (first chance) eax=00000000 ebx=00000000 ecx=268d0000 edx=00000000 esi=77152054 edi=7715261c eip=771f1ba2 esp=0019fa20 ebp=0019fa4c iopl=0 nv up ei pl zr na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 ntdll!LdrpDoDebuggerBreak+0x2b: 771f1ba2 cc int 3 0:000> g ModLoad: 75ff0000 76015000 C:\WINDOWS\SysWOW64\IMM32.DLL ModLoad: 75ef0000 75fea000 C:\WINDOWS\SysWOW64\CRYPT32.dll ModLoad: 73500000 7350e000 C:\WINDOWS\SysWOW64\MSASN1.dll ModLoad: 73700000 73774000 C:\WINDOWS\SysWOW64\uxtheme.dll ModLoad: 6cdd0000 6cffb000 C:\WINDOWS\SysWOW64\iertutil.dll ModLoad: 743e0000 74401000 C:\WINDOWS\SysWOW64\SspiCli.dll ModLoad: 74460000 74a6c000 C:\WINDOWS\SysWOW64\windows.storage.dll ModLoad: 74430000 74455000 C:\WINDOWS\SysWOW64\Wldp.dll ModLoad: 74410000 74428000 C:\WINDOWS\SysWOW64\profapi.dll ModLoad: 66e60000 66e72000 C:\WINDOWS\SysWOW64\ondemandconnroutehelper.dll ModLoad: 73fc0000 7408b000 C:\WINDOWS\SysWOW64\winhttp.dll ModLoad: 74a70000 74a7f000 C:\WINDOWS\SysWOW64\kernel.appcore.dll ModLoad: 74090000 740e2000 C:\WINDOWS\SysWOW64\mswsock.dll ModLoad: 75bf0000 75c4f000 C:\WINDOWS\SysWOW64\bcryptPrimitives.dll ModLoad: 74190000 741c2000 C:\WINDOWS\SysWOW64\IPHLPAPI.DLL ModLoad: 712a0000 712a8000 C:\WINDOWS\SysWOW64\WINNSI.DLL ModLoad: 75be0000 75be7000 C:\WINDOWS\SysWOW64\NSI.dll ModLoad: 71f80000 71fab000 C:\WINDOWS\SysWOW64\DEVOBJ.dll ModLoad: 6f110000 6f118000 C:\WINDOWS\SysWOW64\DPAPI.DLL ModLoad: 70a60000 70a73000 C:\WINDOWS\SysWOW64\CRYPTSP.dll ModLoad: 70a30000 70a5f000 C:\WINDOWS\SysWOW64\rsaenh.dll ModLoad: 740f0000 740fa000 C:\WINDOWS\SysWOW64\CRYPTBASE.dll ModLoad: 6b3f0000 6b598000 C:\WINDOWS\SysWOW64\urlmon.dll ModLoad: 6b3d0000 6b3ed000 C:\WINDOWS\SysWOW64\srvcli.dll ModLoad: 74250000 7425b000 C:\WINDOWS\SysWOW64\netutils.dll ModLoad: 712b0000 71341000 C:\WINDOWS\SysWOW64\DNSAPI.dll ModLoad: 6f340000 6f348000 C:\Windows\SysWOW64\rasadhlp.dll ModLoad: 6f350000 6f3a8000 C:\WINDOWS\SysWOW64\fwpuclnt.dll ModLoad: 6c410000 6c488000 C:\WINDOWS\SysWOW64\schannel.dll ModLoad: 74b40000 74b50000 C:\WINDOWS\SysWOW64\mskeyprotect.dll ModLoad: 6b7c0000 6b7e8000 C:\WINDOWS\SysWOW64\NTASN1.dll ModLoad: 6cce0000 6cd06000 C:\Windows\SysWOW64\cryptnet.dll ModLoad: 6b600000 6b621000 C:\WINDOWS\SysWOW64\ncrypt.dll ModLoad: 6c3f0000 6c40f000 C:\WINDOWS\SysWOW64\ncryptsslp.dll ModLoad: 757d0000 758a4000 C:\WINDOWS\SysWOW64\MSCTF.dll ModLoad: 66dc0000 66e54000 C:\WINDOWS\SysWOW64\TextShaping.dll ModLoad: 74dc0000 74fd0000 C:\WINDOWS\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.1110_none_a8625c1886757984\comctl32.DLL ModLoad: 66d00000 66db9000 C:\WINDOWS\SysWOW64\textinputframework.dll ModLoad: 669e0000 66a7b000 C:\WINDOWS\SysWOW64\CoreMessaging.dll ModLoad: 66a80000 66cfe000 C:\WINDOWS\SysWOW64\CoreUIComponents.dll ModLoad: 74a80000 74aa9000 C:\WINDOWS\SysWOW64\ntmarta.dll ModLoad: 66900000 669db000 C:\WINDOWS\SysWOW64\wintypes.dll ModLoad: 73680000 736d3000 C:\WINDOWS\SysWOW64\Oleacc.dll ModLoad: 76600000 7667e000 C:\WINDOWS\SysWOW64\clbcatq.dll ModLoad: 67e50000 67ed8000 C:\WINDOWS\SysWOW64\sxs.dll ModLoad: 765e0000 765f9000 C:\WINDOWS\SysWOW64\imagehlp.dll ModLoad: 6cd10000 6cd2e000 C:\WINDOWS\SysWOW64\gpapi.dll ModLoad: 742e0000 743a2000 C:\WINDOWS\SysWOW64\PROPSYS.dll (52d0.49b0): C++ EH exception - code e06d7363 (first chance) (52d0.49b0): Stack overflow - code c00000fd (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=00000001 ebx=0088f638 ecx=004c6ec8 edx=13831ad4 esi=004c6db8 edi=00441681 eip=00464a1d esp=000a3000 ebp=000a3004 iopl=0 nv up ei pl nz na po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010202 KDataScope+0x64a1d: 00464a1d 56 push esi 0:000> g *** Unhandled exception 0xc00000fd, hit in "C:\Program Files (x86)\KDataScope-GER\KDataScope.exe": *** enter .exr 000A2AD0 for the exception record *** enter .cxr 000A2B20 for the context *** then kb to get the faulting stack (52d0.49b0): Break instruction exception - code 80000003 (first chance) eax=00000000 ebx=000a2994 ecx=007f2212 edx=000a27b1 esi=00000000 edi=00000065 eip=77228b7b esp=000a2910 ebp=000a2948 iopl=0 nv up ei pl nz ac po nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000212 ntdll!RtlUnhandledExceptionFilter2+0x2cb: 77228b7b cc int 3 0:000> g (52d0.49b0): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. eax=0088f638 ebx=73685de0 ecx=02cb0028 edx=13831ad7 esi=00ce4e38 edi=02c69d00 eip=feeefeee esp=0019f77c ebp=0019f788 iopl=0 nv up ei pl zr na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00010246 feeefeee ?? ??? 0:000> g *** An Access Violation occurred in "C:\Program Files (x86)\KDataScope-GER\KDataScope.exe": The instruction at FEEEFEEE tried to read from an invalid address, FEEEFEEE *** enter .exr 0019F24C for the exception record *** enter .cxr 0019F29C for the context *** then kb to get the faulting stack (52d0.49b0): Break instruction exception - code 80000003 (first chance) eax=00000000 ebx=0019f10c ecx=77163f18 edx=0019ef21 esi=00000000 edi=00000065 eip=77228b7b esp=0019f088 ebp=0019f0c0 iopl=0 nv up ei pl nz ac pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000216 ntdll!RtlUnhandledExceptionFilter2+0x2cb: 77228b7b cc int 3 0:000> g ModLoad: 66890000 668c1000 C:\WINDOWS\SysWOW64\dataexchange.dll ModLoad: 666b0000 66890000 C:\WINDOWS\SysWOW64\d3d11.dll ModLoad: 66540000 666a5000 C:\WINDOWS\SysWOW64\dcomp.dll ModLoad: 66470000 66533000 C:\WINDOWS\SysWOW64\dxgi.dll ModLoad: 662e0000 6646f000 C:\WINDOWS\SysWOW64\twinapi.appcore.dll (52d0.49b0): Unknown exception - code c0150010 (first chance) (52d0.49b0): Unknown exception - code c0150010 (!!! second chance !!!) eax=0019fcf0 ebx=0019fda8 ecx=00000000 edx=00001a95 esi=0019fda0 edi=0023a184 eip=771d8e8b esp=0019fcd8 ebp=0019fd4c iopl=0 nv up ei pl zr na pe nc cs=0023 ss=002b ds=002b es=002b fs=0053 gs=002b efl=00000246 ntdll!RtlDeactivateActivationContextUnsafeFast+0x4c76b: 771d8e8b e97139fbff jmp ntdll!RtlDeactivateActivationContextUnsafeFast+0xe1 (7718c801) 0:000> g WARNING: Continuing a non-continuable exception