Jump to content

Wow Error #132


Recommended Posts

Posted

When i start pandawow.exe i get error #132

 

==============================================================================

World of WarCraft: Retail Build (build 17688)

 

Exe: C:\Users\aggressorr\Games\Wow Pandaria Russia\PandaWoW.exe

Time: Aug 17, 2014 3:17:51.190 PM

User: aggressorr

Computer: GL

------------------------------------------------------------------------------

 

This application has encountered a critical error:

 

ERROR #132 (0x85100084) Fatal exception!

 

Program: C:\Users\aggressorr\Games\Wow Pandaria Russia\PandaWoW.exe

ProcessID: 4168

Exception: 0xC0000005 (ACCESS_VIOLATION) at 0023:005B42A5

 

The instruction at "0x005B42A5" referenced memory at "0x00000024".

The memory could not be "read".

 

5.4.2.17688

Retail

10

17688

5.4.2

World of WarCraft

Type: WoW

Executable UUID:

X86

User:

Computer: GL

Virtual Memory: 97.25 MB

Free Disk Space: 297.14 GB

Exe Built: Sep 23 2013 18:30:35

App Up Time: 0 days, 0 hours, 0 minutes, 1 seconds

System Up Time: 0 days, 4 hours, 17 minutes, 31 seconds

Session Time(hh:mm:ss): 00:00:00

00:00:00 - 00:14:59

Time in World(hh:mm:ss): 00:00:00

00:00:00 - 00:00:00

0

0

Addon resource usage (not including lua memory): 0

No

No

Number of successful WoWConnections: 0

 

CVar Settings:

enGB

enUS

 

----------------------------------------

Installation settings:

----------------------------------------

UID: wow

Expansion Level: 4

PTR: 0

Beta: 0

PatchURL: ''

ProductCode: 'WoW'

 

----------------------------------------

GxInfo

----------------------------------------

No GX Device Created

Desktop Display List:

Device Name: \\.\DISPLAY1

Device String: ATI Mobility Radeon HD 5000 Series

State Flags: 0x00000005

Device ID: PCI\VEN_1002&DEV_68C1&SUBSYS_03111025&REV_00

 

Installed DX9 Version:

File Version: 6.1.7600.16385

 

Exception

ERROR #132 (0x85100084) Fatal exception!

The instruction at "0x005B42A5" referenced memory at "0x00000024".

The memory could not be "read".

0xC0000005 (ACCESS_VIOLATION) at 0023:005B42A5

<:inspector.summary>

------------------------------------------------------------------------------

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

<:inspector.assertion>

DBG-OPTIONS

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-OPTIONS

<:inspector.hashblock>

 

----------------------------------------

x86 Registers

----------------------------------------

 

EAX=037053C0 EBX=02C979A0 ECX=00000000 EDX=00020008 ESI=02C97990

EDI=02C979D4 EBP=037052A0 ESP=037052A0 EIP=005B42A5 FLG=00010212

CS =0023 DS =002B ES =002B SS =002B FS =0053 GS =002B

 

 

----------------------------------------

Stack Trace (Manual)

----------------------------------------

 

Showing 2/2 threads...

 

--- Thread ID: 2676 [Current Thread] ---

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("PandaWoW.exe")

DBG-ADDR("kernel32.dll")

DBG-ADDR("kernel32.dll")

 

--- Thread ID: 3288 ---

DBG-ADDR("ntdll.dll")

DBG-ADDR("mswsock.dll")

DBG-ADDR("WS2_32.dll")

DBG-ADDR("WININET.dll")

DBG-ADDR("WININET.dll")

DBG-ADDR("kernel32.dll")

DBG-ADDR("ntdll.dll")

DBG-ADDR("ntdll.dll")

 

----------------------------------------

Stack Trace (Using DBGHELP.DLL)

----------------------------------------

 

Showing 2/2 threads...

 

--- Thread ID: 2676 [Current Thread] ---

005B42A5 PandaWoW.exe SSyncObject::SSyncObject+18069 (02C97990,037053C0,00000000,00000001)

002A6B31 PandaWoW.exe SMemDumpUsage+192 (009E1D84,FFFFFFFF,02C979A0,00000030)

002A70BE PandaWoW.exe SMemDumpUsage+1613 (009E1D84,FFFFFFFF,0370541C,000D1029)

002A715B PandaWoW.exe SMemFree+21 (02C979A8,009E1D84,FFFFFFFF,00000000)

000D1029 PandaWoW.exe +0 (02C979A8,00000400,02C979A8,03706BC8)

000EEF41 PandaWoW.exe SGetCurrentProcessId+22709 (00000001,009E3620,00003F40,00000104)

0010B08A PandaWoW.exe SGetCurrentProcessId+137726 (0370EDBC,03706BDC,00003F40,009E6118)

000E4C6F PandaWoW.exe SFile::MakeFileLocal+581 (0370EDBC,0370EAB8,00000BB8,0370AB78)

000D65DE PandaWoW.exe +0 (009EC628,00000BB8,00B9911F,000000E8)

000D84ED PandaWoW.exe +0 (00000000,00000000,00000001,61746144)

000D890A PandaWoW.exe +0 (016ABEF0,00000001,0370F96C,000D8E08)

000D8DEB PandaWoW.exe +0 (000DE818,0370F9A4,763C1012,016ABEF0)

000D8E08 PandaWoW.exe +0 (016ABEF0,19D7FE7E,00000000,00000000)

763C1012 kernel32.dll CreateFiberEx+524 (016AC1F0,016AC1F0,00000000,00000000)

763C0FCA kernel32.dll CreateFiberEx+452 (00000000,00000000,00000000,00000000)

 

--- Thread ID: 3288 ---

776DF861 ntdll.dll NtWaitForSingleObject+21 (000021F4,000021F8,00000001,00000004)

7289678C mswsock.dll +0 (00000001,03B1F8FC,03B1F6F4,03B1F7F8)

75B04A20 WS2_32.dll select+159 (00000001,03B1F8FC,03B1F6F4,03B1F7F8)

764EB60C WININET.dll InternetCanonicalizeUrlW+637 (03B1FA38,763A3677,0169F910,03B1FA78)

764DA443 WININET.dll InternetSetStatusCallbackA+597 (0169F910,03B1FA78,776F9F02,0169F910)

763A3677 kernel32.dll BaseThreadInitThunk+18 (0169F910,74261A02,00000000,00000000)

776F9F02 ntdll.dll RtlInitializeExceptionChain+99 (764DA436,0169F910,00000000,00000000)

776F9ED5 ntdll.dll RtlInitializeExceptionChain+54 (764DA436,0169F910,00000000,00000000)

 

 

 

----------------------------------------

Loaded Modules

----------------------------------------

 

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

DBG-MODULE

<:inspector.debugmodules>

 

----------------------------------------

Memory Dump

----------------------------------------

 

Code: 32 bytes starting at (EIP = 005B42A5 - 10)

 

005B4295: 81 E0 03 00 00 C3 8D 81 E4 03 00 00 C3 55 8B EC .............U..

* = addr ** *

005B42A5: 8B 41 24 83 F8 FF 75 04 33 C0 EB 42 56 8B 75 08 .A$...u.3..BV.u.

 

 

Stack: 1024 bytes starting at (ESP = 037052A0 - 20)

 

03705280: 00 00 00 00 34 FD FF FF E4 02 00 00 34 FD FF FF ....4.......4...

03705290: CC 02 00 00 19 00 00 00 00 00 00 00 D4 53 70 03 .............Sp.

* = addr ** *

037052A0: D4 53 70 03 31 6B 2A 00 90 79 C9 02 C0 53 70 03 .Sp.1k*..y...Sp.

037052B0: 00 00 00 00 01 00 00 00 DC 6B 70 03 00 00 00 00 .........kp.....

037052C0: 78 02 00 00 30 42 01 01 00 52 70 03 0C 53 70 03 x...0B...Rp..Sp.

037052D0: 38 53 70 03 E5 0A 73 77 0A 28 F9 00 FE FF FF FF 8Sp...sw.(......

037052E0: FA 2F 6F 77 F2 2B 6F 77 00 00 00 00 48 83 6B 01 ./ow.+ow....H.k.

037052F0: 48 83 6B 01 01 00 00 00 00 00 00 00 40 83 6B 01 H.k.........@.k.

03705300: 48 53 70 03 88 3E 6A 75 00 00 67 01 00 00 00 00 HSp..>ju..g.....

03705310: 9F 3F 6A 75 98 54 D7 19 01 00 00 00 48 83 6B 01 .?ju.T......H.k.

03705320: 00 00 00 00 48 83 6B 01 14 41 3A 76 A8 79 C9 02 ....H.k..A:v.y..

03705330: 14 53 70 03 48 83 6B 01 94 F9 70 03 B0 5E 6C 75 .Sp.H.k...p..^lu

03705340: D8 7E CB 6F FE FF FF FF 9F 3F 6A 75 28 38 4B 76 .~.o.....?ju(8Kv

03705350: 7C 53 70 03 CB 5E 73 77 00 00 00 00 48 83 6B 01 |Sp..^sw....H.k.

03705360: D7 5E 73 77 80 53 70 03 24 C4 4C 76 01 00 00 00 .^sw.Sp.$.Lv....

03705370: A0 60 6A 01 38 7D 6B 01 06 B3 E7 74 8C 53 70 03 .`j.8}k....t.Sp.

03705380: 3C 4F 4B 76 02 00 00 00 D0 53 70 03 A4 53 70 03

03705390: 0F 4F 4B 76 A4 53 70 03 16 4F 4B 76 02 00 00 00 .OKv.Sp..OKv....

037053A0: 08 00 CC 00 E8 53 70 03 72 C9 4C 76 D0 53 70 03 .....Sp.r.Lv.Sp.

037053B0: DC 6B 70 03 D8 21 00 00 A8 79 C9 02 F0 53 70 03 .kp..!...y...Sp.

037053C0: 90 79 C9 02 D0 79 C9 02 00 00 00 00 54 00 00 00 .y...y......T...

037053D0: D8 21 00 00 F4 53 70 03 BE 70 2A 00 84 1D 9E 00 .!...Sp..p*.....

037053E0: FF FF FF FF A0 79 C9 02 30 00 00 00 A8 79 C9 02 .....y..0....y..

037053F0: D0 13 3A 76 04 54 70 03 5B 71 2A 00 84 1D 9E 00 ..:v.Tp.[q*.....

03705400: FF FF FF FF 1C 54 70 03 29 10 0D 00 A8 79 C9 02 .....Tp.)....y..

03705410: 84 1D 9E 00 FF FF FF FF 00 00 00 00 30 54 70 03 ............0Tp.

03705420: 41 EF 0E 00 A8 79 C9 02 00 04 00 00 A8 79 C9 02 A....y.......y..

03705430: C8 6B 70 03 8A B0 10 00 01 00 00 00 20 36 9E 00 .kp......... 6..

03705440: 40 3F 00 00 04 01 00 00 2F 70 61 74 63 68 00 00 @?....../patch..

03705450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705470: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037054A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037054B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037054C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037054D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037054E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037054F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705520: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705530: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705540: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705550: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705560: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705570: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705590: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037055A0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037055B0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037055C0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037055D0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037055E0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

037055F0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705600: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705610: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705620: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705630: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705640: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

03705690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................

 

 

------------------------------------------------------------------------------

Percent memory used: 36

Total physical memory: 6298562560

Free physical memory: 3977572352

Page file: 12595179520

Total virtual memory: 4294836224

Free virtual memory: 4188352512

------------------------------------------------------------------------------

 

List of running PandaWoW.exe processes

 

Process: C:\Users\aggressorr\Games\Wow Pandaria Russia\PandaWoW.exe; pid: 4168

 

List of running Agent.exe processes

 

 

I try to fix registry delete WTF Cache and interface folders but nothing... Please help me.

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
×
×
  • Create New...