Jump to content

kordloperdlo

Members
  • Posts

    362
  • Joined

  • Last visited

Everything posted by kordloperdlo

  1. 1) https://db.pandawow.me?achievement=6583 2) х100 3) Повысил 1 питомца до 10 а дало вместе с https://db.pandawow.me?achievement=6567 4) Должно давать как надо, учитывать кол-во. 5) 5/10
  2. https://db.pandawow.me?npc=61327 х100 Не работает умение https://ru.wowhead.com/pet-ability=383 что в холостую, что вместе с наложенной https://ru.wowhead.com/pet-ability=339 или https://ru.wowhead.com/pet-ability=382/ х100 5/10
  3. ну блин другого отдела нет для создание таких тем, и на то это баг репорт, коль не работает.
  4. 1) https://ru.wowhead.com/pet-ability=245 2) х100 3) Не работает. 4) Должно работать. 5) 5\10
  5. 1) https://db.pandawow.me?npc=62177 2) х100 3) Умение https://ru.wowhead.com/pet-ability=506 не блокирует удар. 4) Должно блокировать. 5) 5/10
  6. только что бил по тактике с вовхеда: бил то одного то другого, но не успевал нанести урон как отхилился и ппц, хоть стой хоть падай.
  7. 1) https://db.pandawow.me?quest=27230/ 2) х100 3) Или убил ранее, что мало вероятно, или просто не заселён https://db.pandawow.me?npc=11121/. 4) Должен работать. 5) 5/10
  8. Error text: Host: forum.pandawow.ru Request: /forumdisplay.php?f=155 HTTPS: on Protocol: HTTP/1.1 User IP: 176.60.76.21 Browser: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36 Referer: https://forum.pandawow.ru/forumdisplay.php?f=151 Timemark: 1561907164 ErrorCode: 502 ClusterNodeID: M-25
  9. Error text: Host: forum.pandawow.ru Request: /showthread.php?t=248544&goto=newpost HTTPS: on Protocol: HTTP/1.1 User IP: 176.60.76.21 Browser: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36 Referer: https://forum.pandawow.ru/forum.php Timemark: 1561905123 ErrorCode: 502 ClusterNodeID: M-17
  10. 1)https://db.pandawow.me?npc=68661 2) х100 3) https://ru.wowhead.com/pet-ability=609 не имеет кд, прожал, и на следующий раунд можно прожимать снова. 4) Должен быть кд 1 раунд. Принцип кд https://ru.wowhead.com/pet-ability=263 что у https://db.pandawow.me?npc=50722. 5) 5/10 п.с. в какую тему лучше создавать такие темы, а то для бп раньше раздел был целый, сейчас что то этого не нашёл.
  11. 1)http://db.pandawow.me?npc=15698 2)х100 3)Должен призываться только в период Зимний покров (Начало: 16.12.2016 в 10:00, конец: 02.01.2017 в 06:00) Но если его призвать не в период эвента, то он говорит вам: Вам это похоже на праздник Зимнего Покрова? Цветные огни, украшения? Нет? Ну, вы знаете, кто должен СДЕЛАТЬ все эти вещи, не так ли? Что? СНОВА? Смотри, [класс]. Столько, сколько я хотел бы смотреть, как ты бьёшь монстров или дебилом находишься на аукционе или НЕВАЖНО что вы там делаете весь год, у меня есть РАБОТА. Смотри, [класс]. Дело в том. Игрушки, огоньки и пучки травы думаю это не те пучки о которых вы думаете Х) сами СЕБЯ не сделают, знаете ли. Так ДОСТАТОЧНО вызывать помощника, ПОЖАЛУЙСТА. Нам нужно ещё двадцать тысяч шестерёнок, и другие ...эй! Вы не можете просто вызывать меня так! Это ещё не Зимний Покров, знаете ли. У меня есть РАБОТА! Что? Почему вы? У меня есть ИГРУШКИ, которые нужно сделать! Ого! Где мастерская? Призовите меня чуть позже в этом году, хорошо? Итак, вы слышали о 432-ом Помощнике? Я слышал, что ...что? ЭЙ! У нас помощников РАБОТА, знаете ли! а потом уходит(текст как и он сам висит приерно 5-7 секунд). Когда вы садитесь на наземного маунта,он садится на оленя.За флай-маунтами не летает. https://www.youtube.com/watch?v=QMyGbIaVLr4 4) Просто бегает за вами(медленно), не смотря на дату. 5)5/10 6)30.07.2016 - - - Добавлено - - - http://db.pandawow.me?npc=15705 тоже самое.
  12. Подтверждаю, подходил не к 1 пет-тренеру, нажимал торговать, а меню торговли не открывается.
  13. 1)http://db.pandawow.me?npc=66815 2)x100 3)Не заселён 4)Должен быть а так же рядом петомци: http://db.pandawow.me?npc=66804,http://db.pandawow.me?npc=66805,http://db.pandawow.me?npc=66802 и привяжите задания есть их нет. 5)05/10 6)09.11.2015
  14. 1)http://cata.wowroad.info/?object=188173 2)х100 3)Не работает Он что то кастует но не уверен что это то что надо, а должен телепортировать на остров. 4)При использовании толжен каставать http://db.pandawow.me?spell=46841. 5)5/10 6)08.11.2015
  15. х100 [spoiler=2015-11-08 14.24.04 Crash - 6080] ============================================================================== World of WarCraft: Retail Build (build 18414) Exe: F:\Games\WoW 548\PandaWoW-32.exe Time: Nov 8, 2015 2:24:04.686 PM User: Администратор Computer: GAPON ------------------------------------------------------------------------------ This application has encountered a critical error: ERROR #132 (0x85100084) Fatal exception! Program: F:\Games\WoW 548\PandaWoW-32.exe ProcessID: 6080 Exception: 0xC0000005 (ACCESS_VIOLATION) at 001B:002247EE The instruction at "0x002247EE" referenced memory at "0x00000000". The memory could not be "read". 5.4.8.18414 Retail 10 18414 5.4.8 World of WarCraft Type: WoW Executable UUID: 53034F87-0E90-46DD-B57A-A3628D952FDA X86 User: Computer: GAPON Virtual Memory: 995.71 MB Free Disk Space: 79.44 GB Exe Built: Jun 13 2014 23:51:27 App Up Time: 0 days, 2 hours, 2 minutes, 50 seconds System Up Time: 0 days, 3 hours, 32 minutes, 39 seconds Session Time(hh:mm:ss): 02:02:26 02:00:00 - 02:14:59 Time in World(hh:mm:ss): 02:01:56 02:00:00 - 02:14:59 1 0 Addon resource usage (not including lua memory): 0 Launcher name: explorer.exe Total lua memory: 39401KB (null) UNKNOWN (null) _NPCScan _NPCScan.Overlay BadBoy BagBrother Bagnon Bagnon_GuildBank FishingBuddy QuestHelper QHData-base QHData-ruRU RaidAchievement Recount WIM DBM-StatusBarTimers DBM-Core DBM-DefaultSkin No No Number of successful WoWConnections: 14 PandaWoW x100 148.251.195.94:15251 Гробница Мореплавателя, Лес Келп’тар 5051 Local Player: Матильдушка, 01800000002D25B4, (0, -4538.95, 3709.31, -95.5883) Locked Target: Tatina, 018000000050B05B, (0, -4578.71, 3719.94, -124.201) CVar Settings: ruRU ruRU logon.pandawow.ru 1 0 5 D3D11 1 0 3 1 1 1.000000 1 50407 1 50407 1 50407 0.40000000596046 0.60000002384186 800 50 2 1 0 1 40 110 75 1 1 2048 2 1 3 300 350 1 1 1 0 1 PandaWoW x100 23 0 50400 0 0 ---------------------------------------- Installation settings: ---------------------------------------- UID: wow Expansion Level: 4 PTR: 0 Beta: 0 PatchURL: '' ProductCode: 'WoW' ---------------------------------------- GxInfo ---------------------------------------- GxApi: D3D11 4_0 Vertex: vs_4_0 Geometry: gs_4_0 Pixel: ps_4_0 Compute: cs_4_0 Adapter 0: Description: NVIDIA GeForce GTS 250 VID=0x10DE,DID=0x0615,REV=0xA2,SSID=0x34E71458 0x10DE Vid Mem: 1007 MB Sys Mem: 0 MB Shared Mem: 1535 MB Flags: 0x00000000 9.18.0013.4181 Installed DX11 Version: File Version: 6.1.7601.17514 Window State: FALSE This 0x0 NV Gpu 0: Clocks: Levels=1, Domains=3, PerfLevel=0, PerfFlags=0x3 Clock Level: Level=0, Level Flags=0x4 Domain: Id=0, Domain Flags=0x0, Freq (def,min,max)=675000 KHz (675000, 168750, 1350000) Domain: Id=4, Domain Flags=0x0, Freq (def,min,max)=1008000 KHz (1008000, 252000, 1320000) Domain: Id=7, Domain Flags=0x0, Freq (def,min,max)=1620000 KHz (1620000, 405000, 3240000) Thermals: Target = 1, Temp cur (min, max)= 59 (0, 127) C NV SLI State: Max Groups: 1: Num AFR Groups: 1 AFR Frame Indexes (prev, cur, next):0, 0, 0 AFR Group New?: FALSE Exception ERROR #132 (0x85100084) Fatal exception! The instruction at "0x002247EE" referenced memory at "0x00000000". The memory could not be "read". 0xC0000005 (ACCESS_VIOLATION) at 001B:002247EE ------------------------------------------------------------------------------ DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-OPTIONS DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-OPTIONS ---------------------------------------- x86 Registers ---------------------------------------- EAX=02D59F60 EBX=00000000 ECX=02D5A25C EDX=00000000 ESI=02D59F64 EDI=00000000 EBP=02D5A5B8 ESP=02D59F50 EIP=002247EE FLG=00010216 CS =001B DS =0023 ES =0023 SS =0023 FS =003B GS =0000 ---------------------------------------- Stack Trace (Manual) ---------------------------------------- Showing 29/29 threads... --- Thread ID: 6012 [Current Thread] --- DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") --- Thread ID: 1564 --- DBG-ADDR("ntdll.dll") DBG-ADDR("mswsock.dll") DBG-ADDR("WS2_32.dll") DBG-ADDR("WININET.dll") DBG-ADDR("WININET.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 4488 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 5008 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("rasman.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 1824 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 4636 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 1432 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 4536 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 4612 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 2456 --- DBG-ADDR("ntdll.dll") DBG-ADDR("KERNELBASE.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 5920 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 4624 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 3072 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 3068 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 1656 --- DBG-ADDR("ntdll.dll") DBG-ADDR("KERNELBASE.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 5180 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 352 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 6008 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 5736 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 1924 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 1012 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 2808 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 5788 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("nvwgf2um.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 700 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 504 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("PandaWoW-32.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 3972 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 5872 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 6108 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") --- Thread ID: 5724 --- DBG-ADDR("ntdll.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") ---------------------------------------- Stack Trace (Using DBGHELP.DLL) ---------------------------------------- Showing 29/29 threads... --- Thread ID: 6012 [Current Thread] --- 002247EE PandaWoW-32.exe +0 (02D5A608,00000000,00000000,02D5A5F0) 0021CDF3 PandaWoW-32.exe +0 (02D5A608,00000BB8,00000000,0000002D) 005FD667 PandaWoW-32.exe +0 (2B1CA4C8,02D5B328,005FDAD3,02D5F970) 005FDAA3 PandaWoW-32.exe +0 (02D5F970,02D5B354,0040C2DD,02D5B344) 005FDAD3 PandaWoW-32.exe +0 (02D5B344,02D5F970,000012F2,0A44A3E0) 0040C2DD PandaWoW-32.exe +0 (02D5F960,0029C0F9,00000000,00000000) 00313728 PandaWoW-32.exe +0 (00000000,00C2AEAC,000012F2,02D5FA14) 003D897F PandaWoW-32.exe +0 (00C2AEAC,02D5FA14,00000000,0A44A3E0) 003D915C PandaWoW-32.exe +0 (00C2AEAC,3008BF40,0000002F,00EB53A0) 003DB367 PandaWoW-32.exe +0 (00BAE341,0069B3C2,0487ED8C,0B41E430) 003DABAB PandaWoW-32.exe +0 (0487ECE8,00000006,00000000,0487ECE8) 0008D25F PandaWoW-32.exe +0 (0487ECE8,00000006,00000000,02D5FAF0) 0008ADD8 PandaWoW-32.exe +0 (0487ECE8,0142F120,00000000,00000000) 0008BBF5 PandaWoW-32.exe +0 (00000000,3D072B02,00000000,69676E45) 0008C0D1 PandaWoW-32.exe +0 (00000000,00048E7F,0004EBDB,02D5FB90) 0008C106 PandaWoW-32.exe +0 (0142F120,8D33254A,00000000,00000000) 77635286 kernel32.dll CreateFiberEx+535 (0142F420,0142F420,00000000,00000000) 7763523E kernel32.dll CreateFiberEx+463 (00000000,00000000,00000000,00000000) --- Thread ID: 1564 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (000021E8,000021EC,00000001,00000004) 75366D30 mswsock.dll +0 (00000001,030CFC20,030CFA18,030CFB1C) 75D86A28 WS2_32.dll select+159 (00000001,030CFC20,030CFA18,030CFB1C) 77163C1E WININET.dll InternetGetConnectedStateExW+952 (030CFD5C,77653C45,01420CF0,030CFD9C) 771797CB WININET.dll InternetSetStatusCallbackA+1165 (01420CF0,030CFD9C,778337F5,01420CF0) 77653C45 kernel32.dll BaseThreadInitThunk+18 (01420CF0,74D4B0D7,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (771797BE,01420CF0,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (771797BE,01420CF0,00000000,00000000) --- Thread ID: 4488 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00000000,0329F918,778337F5,0143F598) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0143F598,74F1B453,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (777FFD0F,0143F598,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (777FFD0F,0143F598,00000000,00000000) --- Thread ID: 5008 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (0000228C,FFFFFFFF,00000001,740920E0) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (0000228C,FFFFFFFF,00000001,00000000) 740833B7 rasman.dll RasAddNotification+1088 (00000000,028FFC50,778337F5,00000000) 77653C45 kernel32.dll BaseThreadInitThunk+18 (00000000,7557B11B,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (740832FB,00000000,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (740832FB,00000000,00000000,00000000) --- Thread ID: 1824 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (000023DC,FFFFFFFF,00000000,02275490) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (000023DC,FFFFFFFF,00000000,032DFC3C) 7764BAA2 kernel32.dll WaitForSingleObject+18 (000023DC,FFFFFFFF,032DFC54,0007049B) 00059B3F PandaWoW-32.exe +0 (02275498,00000000,0228C2A0,0228C308) 0007049B PandaWoW-32.exe +0 (02275490,00000000,0228C308,032DFCA0) 000749F4 PandaWoW-32.exe +0 (0228C2A0,8CB4311A,00000000,0228C308) 006B61B0 PandaWoW-32.exe AssertAndCrash+100168 (00000000,032DFCB8,77653C45,0228C308) 006B623A PandaWoW-32.exe AssertAndCrash+100306 (0228C308,032DFCF8,778337F5,0228C308) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0228C308,74F5B1B3,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (006B61D6,0228C308,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (006B61D6,0228C308,00000000,00000000) --- Thread ID: 4636 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00002108,FFFFFFFF,00000000,00BD51F0) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (00002108,FFFFFFFF,00000000,02C0F774) 7764BAA2 kernel32.dll WaitForSingleObject+18 (00002108,FFFFFFFF,00000000,0229EEA8) 000797E0 PandaWoW-32.exe +0 (00000000,00000000,0229E888,02C0F7C0) 000749F4 PandaWoW-32.exe +0 (0229EEA8,8D593A7A,00000000,0229E888) 006B61B0 PandaWoW-32.exe AssertAndCrash+100168 (00000000,02C0F7D8,77653C45,0229E888) 006B623A PandaWoW-32.exe AssertAndCrash+100306 (0229E888,02C0F818,778337F5,0229E888) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0229E888,7518B553,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (006B61D6,0229E888,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (006B61D6,0229E888,00000000,00000000) --- Thread ID: 1432 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00002120,FFFFFFFF,00000000,022A61D8) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (00002120,FFFFFFFF,00000000,0344FC4C) 7764BAA2 kernel32.dll WaitForSingleObject+18 (00002120,FFFFFFFF,0344FC64,0007049B) 00059B3F PandaWoW-32.exe +0 (022A61E0,00000000,0229EF18,022B62F8) 0007049B PandaWoW-32.exe +0 (022A61D8,00000000,022B62F8,0344FCB0) 000749F4 PandaWoW-32.exe +0 (0229EF18,8CDD310A,00000000,022B62F8) 006B61B0 PandaWoW-32.exe AssertAndCrash+100168 (00000000,0344FCC8,77653C45,022B62F8) 006B623A PandaWoW-32.exe AssertAndCrash+100306 (022B62F8,0344FD08,778337F5,022B62F8) 77653C45 kernel32.dll BaseThreadInitThunk+18 (022B62F8,749CB043,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (006B61D6,022B62F8,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (006B61D6,022B62F8,00000000,00000000) --- Thread ID: 4536 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00002708,FFFFFFFF,00000000,00000000) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (00002708,FFFFFFFF,00000000,0515FAB0) 7764BAA2 kernel32.dll WaitForSingleObject+18 (00002708,FFFFFFFF,0515FAC8,0017D1FF) 00224017 PandaWoW-32.exe +0 (FFFFFFFF,00CB9B94,0231B350,77817760) 0017D1FF PandaWoW-32.exe +0 (0231B330,00000000,00000000,0231B350) 0021F88F PandaWoW-32.exe +0 (00CB9BF4,0515FB3C,778337F5,0231B350) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0231B350,72CDB677,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (0021F7F2,0231B350,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (0021F7F2,0231B350,00000000,00000000) --- Thread ID: 4612 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00002710,FFFFFFFF,00000000,00000000) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (00002710,FFFFFFFF,00000000,04CEFA3C) 7764BAA2 kernel32.dll WaitForSingleObject+18 (00002710,FFFFFFFF,04CEFA54,0017D571) 00224017 PandaWoW-32.exe +0 (FFFFFFFF,00CB9B94,0231B390,77817760) 0017D571 PandaWoW-32.exe +0 (00000001,00000000,00000000,0231B390) 0021F88F PandaWoW-32.exe +0 (00CB9C20,04CEFAC8,778337F5,0231B390) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0231B390,7316B783,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (0021F7F2,0231B390,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (0021F7F2,0231B390,00000000,00000000) --- Thread ID: 2456 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00000064,00000000,04BEF838,0006BFE7) 75B11818 KERNELBASE.dll Sleep+15 (00000064,00000000,04911F10,000749F4) 0006BFE7 PandaWoW-32.exe +0 (04911F10,8B2735CA,00000000,04714368) 006B61B0 PandaWoW-32.exe AssertAndCrash+100168 (00000000,04BEF888,77653C45,04714368) 006B623A PandaWoW-32.exe AssertAndCrash+100306 (04714368,04BEF8C8,778337F5,04714368) 77653C45 kernel32.dll BaseThreadInitThunk+18 (04714368,7366B583,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (006B61D6,04714368,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (006B61D6,04714368,00000000,00000000) --- Thread ID: 5920 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00002780,FFFFFFFF,00000000,08835100) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (00002780,FFFFFFFF,00000000,0551F854) 7764BAA2 kernel32.dll WaitForSingleObject+18 (00002780,FFFFFFFF,00000000,08835100) 6F664041 nvwgf2um.dll OpenAdapter10+568289 (0551F87C,6F662F85,00000000,00000000) 6F662EE6 nvwgf2um.dll OpenAdapter10+563846 (08848680,0551F8C0,6FEDD52F,088351F4) 6F77D495 nvwgf2um.dll NVAPI_Thunk+462309 (088351F4,A6A3B4D3,00000000,08848680) 6FEDD52F nvwgf2um.dll NVAPI_Thunk+8195711 (00000000,0551F8D8,77653C45,088373F0) 6FEDD657 nvwgf2um.dll NVAPI_Thunk+8196007 (088373F0,0551F918,778337F5,088373F0) 77653C45 kernel32.dll BaseThreadInitThunk+18 (088373F0,7289B453,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (6FEDD5DB,088373F0,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (6FEDD5DB,088373F0,00000000,00000000) --- Thread ID: 4624 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (0000279C,FFFFFFFF,00000000,00BFB610) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (0000279C,FFFFFFFF,00000000,059AFA74) 7764BAA2 kernel32.dll WaitForSingleObject+18 (0000279C,FFFFFFFF,059AFA8C,00127EF1) 00224017 PandaWoW-32.exe +0 (FFFFFFFF,00CB9B94,04A94168,77817760) 00127EF1 PandaWoW-32.exe +0 (04A85C78,00000000,00000000,04A94168) 0021F88F PandaWoW-32.exe +0 (00CB9C4C,059AFB00,778337F5,04A94168) 77653C45 kernel32.dll BaseThreadInitThunk+18 (04A94168,7242B64B,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (0021F7F2,04A94168,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (0021F7F2,04A94168,00000000,00000000) --- Thread ID: 3072 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00000000,0AE1F8E4,778337F5,00000000) 77653C45 kernel32.dll BaseThreadInitThunk+18 (00000000,7D39B5AF,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (777EF4C0,00000000,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (777EF4C0,00000000,00000000,00000000) --- Thread ID: 3068 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00000000,0AECFCAC,778337F5,00000000) 77653C45 kernel32.dll BaseThreadInitThunk+18 (00000000,7D34B1E7,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (7351A3E0,00000000,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (7351A3E0,00000000,00000000,00000000) --- Thread ID: 1656 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (0000000A,00000000,0596FF0C,001982AC) 75B11818 KERNELBASE.dll Sleep+15 (0000000A,0596FF20,00198658,0000000A) 001982AC PandaWoW-32.exe +0 (0000000A,00000000,00000678,0596FF2C) 00198658 PandaWoW-32.exe +0 (09702C18,0596FF6C,778337F5,09702C18) 77653C45 kernel32.dll BaseThreadInitThunk+18 (09702C18,724EB227,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (001985EA,09702C18,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (001985EA,09702C18,00000000,00000000) --- Thread ID: 5180 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00002818,000003E8,00000000,097FC000) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (00002818,000003E8,00000000,0AFDFAC0) 7764BAA2 kernel32.dll WaitForSingleObject+18 (00002818,000003E8,0AFDFAD8,006928F3) 00224017 PandaWoW-32.exe +0 (000003E8,00CB9B94,04A94208,77817760) 006928F3 PandaWoW-32.exe +0 (00000000,0AFDFB0C,0021F88F,097FC010) 006929FA PandaWoW-32.exe +0 (097FC010,00000000,00000000,04A94208) 0021F88F PandaWoW-32.exe +0 (00CB9C78,0AFDFB58,778337F5,04A94208) 77653C45 kernel32.dll BaseThreadInitThunk+18 (04A94208,7D25B613,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (0021F7F2,04A94208,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (0021F7F2,04A94208,00000000,00000000) --- Thread ID: 352 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (0ADCF81C,0ADCF890,00000000,000001F4) 7764BC8E kernel32.dll WaitForMultipleObjectsEx+142 (00000002,7FFDA000,00000000,000001F4) 7764BCFC kernel32.dll WaitForMultipleObjects+24 (00000002,0ADCF9F0,00000000,000001F4) 00692F2B PandaWoW-32.exe +0 (0A429968,006927E8,0ADCFB60,0021F88F) 00692795 PandaWoW-32.exe +0 (097FC000,00000000,00000000,0A429968) 0021F88F PandaWoW-32.exe +0 (00CB9CA4,0ADCFBAC,778337F5,0A429968) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0A429968,7D04B6E7,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (0021F7F2,0A429968,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (0021F7F2,0A429968,00000000,00000000) --- Thread ID: 6008 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (000028C0,FFFFFFFF,00000000,089A3E80) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (000028C0,FFFFFFFF,00000000,056FFECC) 7764BAA2 kernel32.dll WaitForSingleObject+18 (000028C0,FFFFFFFF,00000000,089A3E80) 6F664041 nvwgf2um.dll OpenAdapter10+568289 (6F662E80,00000018,00000000,00000000) 6F662EE6 nvwgf2um.dll OpenAdapter10+563846 (089BA2F8,056FFF34,6FEDD52F,089A3F74) 6F77D495 nvwgf2um.dll NVAPI_Thunk+462309 (089A3F74,A69DB327,00000000,089BA2F8) 6FEDD52F nvwgf2um.dll NVAPI_Thunk+8195711 (00000000,056FFF4C,77653C45,089A6168) 6FEDD657 nvwgf2um.dll NVAPI_Thunk+8196007 (089A6168,056FFF8C,778337F5,089A6168) 77653C45 kernel32.dll BaseThreadInitThunk+18 (089A6168,72B7B2C7,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (6FEDD5DB,089A6168,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (6FEDD5DB,089A6168,00000000,00000000) --- Thread ID: 5736 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00002954,FFFFFFFF,00000000,00000000) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (00002954,FFFFFFFF,00000000,0ADDFB60) 7764BAA2 kernel32.dll WaitForSingleObject+18 (00002954,FFFFFFFF,00000000,089BAE50) 6F70C38A nvwgf2um.dll OpenAdapter10+1257258 (00000000,0ADDFBA4,6FEDD52F,014FDC40) 6F70C2B0 nvwgf2um.dll OpenAdapter10+1257040 (014FDC40,A92FB7B7,00000000,089BAE50) 6FEDD52F nvwgf2um.dll NVAPI_Thunk+8195711 (00000000,0ADDFBBC,77653C45,089BB5E0) 6FEDD657 nvwgf2um.dll NVAPI_Thunk+8196007 (089BB5E0,0ADDFBFC,778337F5,089BB5E0) 77653C45 kernel32.dll BaseThreadInitThunk+18 (089BB5E0,7D05B6B7,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (6FEDD5DB,089BB5E0,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (6FEDD5DB,089BB5E0,00000000,00000000) --- Thread ID: 1924 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00002954,FFFFFFFF,00000000,00000000) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (00002954,FFFFFFFF,00000000,0C36FD90) 7764BAA2 kernel32.dll WaitForSingleObject+18 (00002954,FFFFFFFF,00000000,089BA6C0) 6F70C38A nvwgf2um.dll OpenAdapter10+1257258 (00000001,0C36FDD4,6FEDD52F,014FDC48) 6F70C2B0 nvwgf2um.dll OpenAdapter10+1257040 (014FDC48,AFC4B1C7,00000000,089BA6C0) 6FEDD52F nvwgf2um.dll NVAPI_Thunk+8195711 (00000000,0C36FDEC,77653C45,089BB218) 6FEDD657 nvwgf2um.dll NVAPI_Thunk+8196007 (089BB218,0C36FE2C,778337F5,089BB218) 77653C45 kernel32.dll BaseThreadInitThunk+18 (089BB218,7BEEB367,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (6FEDD5DB,089BB218,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (6FEDD5DB,089BB218,00000000,00000000) --- Thread ID: 1012 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (0000293C,FFFFFFFF,00000000,00000000) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (0000293C,FFFFFFFF,00000000,0C41FC84) 7764BAA2 kernel32.dll WaitForSingleObject+18 (0000293C,FFFFFFFF,00000000,089BC500) 6F70C38A nvwgf2um.dll OpenAdapter10+1257258 (00000000,0C41FCC8,6FEDD52F,014FDED0) 6F70C2B0 nvwgf2um.dll OpenAdapter10+1257040 (014FDED0,AFB3B0DB,00000000,089BC500) 6FEDD52F nvwgf2um.dll NVAPI_Thunk+8195711 (00000000,0C41FCE0,77653C45,089BB218) 6FEDD657 nvwgf2um.dll NVAPI_Thunk+8196007 (089BB218,0C41FD20,778337F5,089BB218) 77653C45 kernel32.dll BaseThreadInitThunk+18 (089BB218,7B99B06B,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (6FEDD5DB,089BB218,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (6FEDD5DB,089BB218,00000000,00000000) --- Thread ID: 2808 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (0000293C,FFFFFFFF,00000000,00000000) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (0000293C,FFFFFFFF,00000000,0AF7FB74) 7764BAA2 kernel32.dll WaitForSingleObject+18 (0000293C,FFFFFFFF,00000000,089BC138) 6F70C38A nvwgf2um.dll OpenAdapter10+1257258 (00000001,0AF7FBB8,6FEDD52F,014FDED8) 6F70C2B0 nvwgf2um.dll OpenAdapter10+1257040 (014FDED8,A905B7AB,00000000,089BC138) 6FEDD52F nvwgf2um.dll NVAPI_Thunk+8195711 (00000000,0AF7FBD0,77653C45,089BB9A8) 6FEDD657 nvwgf2um.dll NVAPI_Thunk+8196007 (089BB9A8,0AF7FC10,778337F5,089BB9A8) 77653C45 kernel32.dll BaseThreadInitThunk+18 (089BB9A8,7D2FB15B,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (6FEDD5DB,089BB9A8,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (6FEDD5DB,089BB9A8,00000000,00000000) --- Thread ID: 5788 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (00002984,FFFFFFFF,00000000,00000000) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (00002984,FFFFFFFF,00000000,0C45FD18) 7764BAA2 kernel32.dll WaitForSingleObject+18 (00002984,FFFFFFFF,00000000,089BCC90) 6F70C38A nvwgf2um.dll OpenAdapter10+1257258 (00000000,0C45FD5C,6FEDD52F,06281CD8) 6F70C2B0 nvwgf2um.dll OpenAdapter10+1257040 (06281CD8,AFB7B14F,00000000,089BCC90) 6FEDD52F nvwgf2um.dll NVAPI_Thunk+8195711 (00000000,0C45FD74,77653C45,089BB218) 6FEDD657 nvwgf2um.dll NVAPI_Thunk+8196007 (089BB218,0C45FDB4,778337F5,089BB218) 77653C45 kernel32.dll BaseThreadInitThunk+18 (089BB218,7B9DB0FF,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (6FEDD5DB,089BB218,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (6FEDD5DB,089BB218,00000000,00000000) --- Thread ID: 700 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (000022F4,00000064,00000000,0A42B6E8) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (000022F4,00000064,00000000,0C5BFD30) 7764BAA2 kernel32.dll WaitForSingleObject+18 (000022F4,00000064,0C5BFD3C,008FC1F8) 00224017 PandaWoW-32.exe +0 (00000064,0C5BFD64,0021F88F,0BA4E0A8) 008FC1F8 PandaWoW-32.exe GetBattlenetAllocator+1956318 (0BA4E0A8,00000000,00000000,0A42B6E8) 0021F88F PandaWoW-32.exe +0 (00CB9CD0,0C5BFDB0,778337F5,0A42B6E8) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0A42B6E8,7B83B0FB,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (0021F7F2,0A42B6E8,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (0021F7F2,0A42B6E8,00000000,00000000) --- Thread ID: 504 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (000020EC,FFFFFFFF,00000000,00000000) 7764BAF3 kernel32.dll WaitForSingleObjectEx+67 (000020EC,FFFFFFFF,00000000,10A9FD1C) 7764BAA2 kernel32.dll WaitForSingleObject+18 (000020EC,FFFFFFFF,10A9FD58,00236003) 00224017 PandaWoW-32.exe +0 (FFFFFFFF,00CB9B94,0EE8E880,77817760) 00236003 PandaWoW-32.exe +0 (00CB9CFC,10A9FDA4,778337F5,0EE8E880) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0EE8E880,6771B0EF,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (0021F7F2,0EE8E880,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (0021F7F2,0EE8E880,00000000,00000000) --- Thread ID: 3972 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (0143C418,0334FA30,778337F5,0143C418) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0143C418,74ECB77B,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (778003E7,0143C418,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (778003E7,0143C418,00000000,00000000) --- Thread ID: 5872 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (0143C418,1471FD78,778337F5,0143C418) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0143C418,63A9B033,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (778003E7,0143C418,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (778003E7,0143C418,00000000,00000000) --- Thread ID: 6108 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (753664B3,0AE8FAD8,778337F5,36C33090) 77653C45 kernel32.dll BaseThreadInitThunk+18 (36C33090,7D30B793,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (753662EE,36C33090,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (753662EE,36C33090,00000000,00000000) --- Thread ID: 5724 --- 778170B4 ntdll.dll KiFastSystemCallRet+0 (0143E908,0C34F8C4,778337F5,0143E908) 77653C45 kernel32.dll BaseThreadInitThunk+18 (0143E908,7BECB58F,00000000,00000000) 778337F5 ntdll.dll RtlInitializeExceptionChain+239 (778003E7,0143E908,00000000,00000000) 778337C8 ntdll.dll RtlInitializeExceptionChain+194 (778003E7,0143E908,00000000,00000000) ---------------------------------------- Loaded Modules ---------------------------------------- DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE ---------------------------------------- Memory Dump ---------------------------------------- Code: 32 bytes starting at (EIP = 002247EE - 10) 002247DE: C7 85 A4 FD FF FF 05 00 00 00 8D B5 AC F9 FF FF ................ * = addr ** * 002247EE: 8A 07 47 89 7D F8 3C 25 75 73 83 7D F0 40 0F 8D ..G.}. Stack: 1024 bytes starting at (ESP = 02D59F50 - 20) 02D59F30: 00 00 00 00 04 00 00 00 34 FD FF FF E4 02 00 00 ........4....... 02D59F40: 34 FD FF FF CC 02 00 00 18 00 00 00 00 00 00 00 4............... * = addr ** * 02D59F50: 08 A6 D5 02 B8 0B 00 00 10 47 0A 31 00 00 00 00 .........G.1.... 02D59F60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D59F70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D59F80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D59F90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D59FA0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D59FB0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D59FC0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D59FD0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D59FE0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D59FF0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A070: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A080: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A0A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A0B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A0C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A0D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A0E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A0F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A100: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A110: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A120: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A130: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A1A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A1B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A1C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A1D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A1E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A1F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A200: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A210: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A220: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A230: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A240: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A250: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A260: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A270: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A280: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A290: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A2A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A2B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A2C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A2D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A2E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A2F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A300: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A310: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A320: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A330: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 02D5A340: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ------------------------------------------------------------------------------ Percent memory used: 68 Total physical memory: 3756515328 Free physical memory: 1175527424 Page file: 7511232512 Total virtual memory: 2147352576 Free virtual memory: 1086283776 ------------------------------------------------------------------------------ List of running PandaWoW-32.exe processes Process: F:\Games\WoW 548\PandaWoW-32.exe; pid: 6080 List of running Agent.exe processes
  16. 1)http://db.pandawow.me?item=94553 2)х100 3)Я её купил у торговца http://db.pandawow.me?npc=39884 за 50к золота в http://ru.wowhead.com/zone=5146. 4)Должна даваться за задание http://db.pandawow.me?quest=32621, которое в свою очередь берётся из http://db.pandawow.me?item=94721, которое падает из мини-босса http://db.pandawow.me?npc=69461 которвый находится на http://ru.wowhead.com/zone=6507, но никак не в http://ru.wowhead.com/zone=5146 5)8/10 6)08.11.2015
  17. 1)http://db.pandawow.me?quest=25558 2)х100 3)Взял отдал. 4)Заскриптуйте [spoiler=Видео] 5)5/10 6)07.11.2015
  18. 1)http://db.pandawow.me?quest=25547 (Альянс) 2)х100 3)Взял отдал (без диалога и т.п.) 4)Заскрыптуйте [spoiler=Видео] 5)5/10 6)07.11.2015
  19. Так я и написал т.к. остров врядли работает по этому хай закроют
  20. это точно не поправят... 2-ой тотем а так посмотрев у тотема 1 способность http://db.pandawow.me?spell=128182, а ней дополнительно некая http://db.pandawow.me?spell=128182 (много флагов) 1-ой тотем 1ый тотем в общето для задания способность тотема http://db.pandawow.me?spell=118526 в эффекте 2 http://db.pandawow.me?spell=128814
  21. 1)http://db.pandawow.me?npc=61129 2)х100 3)Стоят криво (http://ru.wowhead.com/zone=6507) 4)Должны стоять ровно, и т.к. не думаю что на острове многое починено, по этому и закрыты. 5)5/10 6)08.11.2015
  22. 1)http://db.pandawow.me?npc=69549 2)х100 3)Заселён и показывает что мёртв, но его можно убить снова. 4)Должен быть мёртв 5)5/10 6)08.11.2015
  23. можно, уже всё работает
×
×
  • Create New...