destrukt Posted August 17, 2014 Posted August 17, 2014 When i start pandawow.exe i get error #132 ============================================================================== World of WarCraft: Retail Build (build 17688) Exe: C:\Users\aggressorr\Games\Wow Pandaria Russia\PandaWoW.exe Time: Aug 17, 2014 3:17:51.190 PM User: aggressorr Computer: GL ------------------------------------------------------------------------------ This application has encountered a critical error: ERROR #132 (0x85100084) Fatal exception! Program: C:\Users\aggressorr\Games\Wow Pandaria Russia\PandaWoW.exe ProcessID: 4168 Exception: 0xC0000005 (ACCESS_VIOLATION) at 0023:005B42A5 The instruction at "0x005B42A5" referenced memory at "0x00000024". The memory could not be "read". 5.4.2.17688 Retail 10 17688 5.4.2 World of WarCraft Type: WoW Executable UUID: X86 User: Computer: GL Virtual Memory: 97.25 MB Free Disk Space: 297.14 GB Exe Built: Sep 23 2013 18:30:35 App Up Time: 0 days, 0 hours, 0 minutes, 1 seconds System Up Time: 0 days, 4 hours, 17 minutes, 31 seconds Session Time(hh:mm:ss): 00:00:00 00:00:00 - 00:14:59 Time in World(hh:mm:ss): 00:00:00 00:00:00 - 00:00:00 0 0 Addon resource usage (not including lua memory): 0 No No Number of successful WoWConnections: 0 CVar Settings: enGB enUS ---------------------------------------- Installation settings: ---------------------------------------- UID: wow Expansion Level: 4 PTR: 0 Beta: 0 PatchURL: '' ProductCode: 'WoW' ---------------------------------------- GxInfo ---------------------------------------- No GX Device Created Desktop Display List: Device Name: \\.\DISPLAY1 Device String: ATI Mobility Radeon HD 5000 Series State Flags: 0x00000005 Device ID: PCI\VEN_1002&DEV_68C1&SUBSYS_03111025&REV_00 Installed DX9 Version: File Version: 6.1.7600.16385 Exception ERROR #132 (0x85100084) Fatal exception! The instruction at "0x005B42A5" referenced memory at "0x00000024". The memory could not be "read". 0xC0000005 (ACCESS_VIOLATION) at 0023:005B42A5 <:inspector.summary> ------------------------------------------------------------------------------ DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") <:inspector.assertion> DBG-OPTIONS DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-OPTIONS <:inspector.hashblock> ---------------------------------------- x86 Registers ---------------------------------------- EAX=037053C0 EBX=02C979A0 ECX=00000000 EDX=00020008 ESI=02C97990 EDI=02C979D4 EBP=037052A0 ESP=037052A0 EIP=005B42A5 FLG=00010212 CS =0023 DS =002B ES =002B SS =002B FS =0053 GS =002B ---------------------------------------- Stack Trace (Manual) ---------------------------------------- Showing 2/2 threads... --- Thread ID: 2676 [Current Thread] --- DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("PandaWoW.exe") DBG-ADDR("kernel32.dll") DBG-ADDR("kernel32.dll") --- Thread ID: 3288 --- DBG-ADDR("ntdll.dll") DBG-ADDR("mswsock.dll") DBG-ADDR("WS2_32.dll") DBG-ADDR("WININET.dll") DBG-ADDR("WININET.dll") DBG-ADDR("kernel32.dll") DBG-ADDR("ntdll.dll") DBG-ADDR("ntdll.dll") ---------------------------------------- Stack Trace (Using DBGHELP.DLL) ---------------------------------------- Showing 2/2 threads... --- Thread ID: 2676 [Current Thread] --- 005B42A5 PandaWoW.exe SSyncObject::SSyncObject+18069 (02C97990,037053C0,00000000,00000001) 002A6B31 PandaWoW.exe SMemDumpUsage+192 (009E1D84,FFFFFFFF,02C979A0,00000030) 002A70BE PandaWoW.exe SMemDumpUsage+1613 (009E1D84,FFFFFFFF,0370541C,000D1029) 002A715B PandaWoW.exe SMemFree+21 (02C979A8,009E1D84,FFFFFFFF,00000000) 000D1029 PandaWoW.exe +0 (02C979A8,00000400,02C979A8,03706BC8) 000EEF41 PandaWoW.exe SGetCurrentProcessId+22709 (00000001,009E3620,00003F40,00000104) 0010B08A PandaWoW.exe SGetCurrentProcessId+137726 (0370EDBC,03706BDC,00003F40,009E6118) 000E4C6F PandaWoW.exe SFile::MakeFileLocal+581 (0370EDBC,0370EAB8,00000BB8,0370AB78) 000D65DE PandaWoW.exe +0 (009EC628,00000BB8,00B9911F,000000E8) 000D84ED PandaWoW.exe +0 (00000000,00000000,00000001,61746144) 000D890A PandaWoW.exe +0 (016ABEF0,00000001,0370F96C,000D8E08) 000D8DEB PandaWoW.exe +0 (000DE818,0370F9A4,763C1012,016ABEF0) 000D8E08 PandaWoW.exe +0 (016ABEF0,19D7FE7E,00000000,00000000) 763C1012 kernel32.dll CreateFiberEx+524 (016AC1F0,016AC1F0,00000000,00000000) 763C0FCA kernel32.dll CreateFiberEx+452 (00000000,00000000,00000000,00000000) --- Thread ID: 3288 --- 776DF861 ntdll.dll NtWaitForSingleObject+21 (000021F4,000021F8,00000001,00000004) 7289678C mswsock.dll +0 (00000001,03B1F8FC,03B1F6F4,03B1F7F8) 75B04A20 WS2_32.dll select+159 (00000001,03B1F8FC,03B1F6F4,03B1F7F8) 764EB60C WININET.dll InternetCanonicalizeUrlW+637 (03B1FA38,763A3677,0169F910,03B1FA78) 764DA443 WININET.dll InternetSetStatusCallbackA+597 (0169F910,03B1FA78,776F9F02,0169F910) 763A3677 kernel32.dll BaseThreadInitThunk+18 (0169F910,74261A02,00000000,00000000) 776F9F02 ntdll.dll RtlInitializeExceptionChain+99 (764DA436,0169F910,00000000,00000000) 776F9ED5 ntdll.dll RtlInitializeExceptionChain+54 (764DA436,0169F910,00000000,00000000) ---------------------------------------- Loaded Modules ---------------------------------------- DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE DBG-MODULE <:inspector.debugmodules> ---------------------------------------- Memory Dump ---------------------------------------- Code: 32 bytes starting at (EIP = 005B42A5 - 10) 005B4295: 81 E0 03 00 00 C3 8D 81 E4 03 00 00 C3 55 8B EC .............U.. * = addr ** * 005B42A5: 8B 41 24 83 F8 FF 75 04 33 C0 EB 42 56 8B 75 08 .A$...u.3..BV.u. Stack: 1024 bytes starting at (ESP = 037052A0 - 20) 03705280: 00 00 00 00 34 FD FF FF E4 02 00 00 34 FD FF FF ....4.......4... 03705290: CC 02 00 00 19 00 00 00 00 00 00 00 D4 53 70 03 .............Sp. * = addr ** * 037052A0: D4 53 70 03 31 6B 2A 00 90 79 C9 02 C0 53 70 03 .Sp.1k*..y...Sp. 037052B0: 00 00 00 00 01 00 00 00 DC 6B 70 03 00 00 00 00 .........kp..... 037052C0: 78 02 00 00 30 42 01 01 00 52 70 03 0C 53 70 03 x...0B...Rp..Sp. 037052D0: 38 53 70 03 E5 0A 73 77 0A 28 F9 00 FE FF FF FF 8Sp...sw.(...... 037052E0: FA 2F 6F 77 F2 2B 6F 77 00 00 00 00 48 83 6B 01 ./ow.+ow....H.k. 037052F0: 48 83 6B 01 01 00 00 00 00 00 00 00 40 83 6B 01 H.k.........@.k. 03705300: 48 53 70 03 88 3E 6A 75 00 00 67 01 00 00 00 00 HSp..>ju..g..... 03705310: 9F 3F 6A 75 98 54 D7 19 01 00 00 00 48 83 6B 01 .?ju.T......H.k. 03705320: 00 00 00 00 48 83 6B 01 14 41 3A 76 A8 79 C9 02 ....H.k..A:v.y.. 03705330: 14 53 70 03 48 83 6B 01 94 F9 70 03 B0 5E 6C 75 .Sp.H.k...p..^lu 03705340: D8 7E CB 6F FE FF FF FF 9F 3F 6A 75 28 38 4B 76 .~.o.....?ju(8Kv 03705350: 7C 53 70 03 CB 5E 73 77 00 00 00 00 48 83 6B 01 |Sp..^sw....H.k. 03705360: D7 5E 73 77 80 53 70 03 24 C4 4C 76 01 00 00 00 .^sw.Sp.$.Lv.... 03705370: A0 60 6A 01 38 7D 6B 01 06 B3 E7 74 8C 53 70 03 .`j.8}k....t.Sp. 03705380: 3C 4F 4B 76 02 00 00 00 D0 53 70 03 A4 53 70 03 03705390: 0F 4F 4B 76 A4 53 70 03 16 4F 4B 76 02 00 00 00 .OKv.Sp..OKv.... 037053A0: 08 00 CC 00 E8 53 70 03 72 C9 4C 76 D0 53 70 03 .....Sp.r.Lv.Sp. 037053B0: DC 6B 70 03 D8 21 00 00 A8 79 C9 02 F0 53 70 03 .kp..!...y...Sp. 037053C0: 90 79 C9 02 D0 79 C9 02 00 00 00 00 54 00 00 00 .y...y......T... 037053D0: D8 21 00 00 F4 53 70 03 BE 70 2A 00 84 1D 9E 00 .!...Sp..p*..... 037053E0: FF FF FF FF A0 79 C9 02 30 00 00 00 A8 79 C9 02 .....y..0....y.. 037053F0: D0 13 3A 76 04 54 70 03 5B 71 2A 00 84 1D 9E 00 ..:v.Tp.[q*..... 03705400: FF FF FF FF 1C 54 70 03 29 10 0D 00 A8 79 C9 02 .....Tp.)....y.. 03705410: 84 1D 9E 00 FF FF FF FF 00 00 00 00 30 54 70 03 ............0Tp. 03705420: 41 EF 0E 00 A8 79 C9 02 00 04 00 00 A8 79 C9 02 A....y.......y.. 03705430: C8 6B 70 03 8A B0 10 00 01 00 00 00 20 36 9E 00 .kp......... 6.. 03705440: 40 3F 00 00 04 01 00 00 2F 70 61 74 63 68 00 00 @?....../patch.. 03705450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037054A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037054B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037054C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037054D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037054E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037054F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037055A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037055B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037055C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037055D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037055E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 037055F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705620: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705630: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ 03705690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ ------------------------------------------------------------------------------ Percent memory used: 36 Total physical memory: 6298562560 Free physical memory: 3977572352 Page file: 12595179520 Total virtual memory: 4294836224 Free virtual memory: 4188352512 ------------------------------------------------------------------------------ List of running PandaWoW.exe processes Process: C:\Users\aggressorr\Games\Wow Pandaria Russia\PandaWoW.exe; pid: 4168 List of running Agent.exe processes I try to fix registry delete WTF Cache and interface folders but nothing... Please help me.
Recommended Posts
Create an account or sign in to comment
You need to be a member in order to leave a comment
Create an account
Sign up for a new account in our community. It's easy!
Register a new accountSign in
Already have an account? Sign in here.
Sign In Now