Also I don't know if this one helps or not, it's the output from the pylotro patcher window.
Code:
Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x4316d100).
Register dump:
CS:0017 SS:001f DS:001f ES:001f FS:1007 GS:0037
EIP:4316d100 ESP:0033fcc0 EBP:0033fd08 EFLAGS:00010202( R- -- I - - - )
EAX:00000000 EBX:4316d0c9 ECX:0033fcc0 EDX:00010080
ESI:10004bb0 EDI:00000001
Stack dump:
0x0033fcc0: 00220620 00000000 7b818699 7b8440dc
0x0033fcd0: 00133f90 00110000 00000000 00133f88
0x0033fce0: 00000001 10040734 00000010 00000010
0x0033fcf0: 0033fd9c 7b9698a0 0033fd18 405a72ac
0x0033fd00: 10004bb0 00000001 0033fe28 10004bbb
0x0033fd10: 0033fe48 10004bbb 10040734 405a765b
0200: sel=1007 base=7ffc0000 limit=00000fff 32-bit rw-
Backtrace:
=>0 0x4316d100 (0x0033fd08)
1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
2 0x405a7f0a (0x0033fea8)
3 0x405a7e58 (0x0033fec8)
4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
6 0x7bc63e0c (0x0033ff48)
7 0x7bc64fea (0x0033ffc8)
8 0x7bc3d95e (0x0033ffe8)
0x4316d100: movl 0x0(%eax),%edx
Modules:
Module Address Debug info Name (23 modules)
PE 340000- 352000 Deferred zlib1t
PE 10000000-100a3000 Export patchclient
PE 405a0000-405a3000 Deferred rundll32
PE 405b0000-405b4000 Deferred version
PE 40710000-40714000 Deferred gdi32
PE 42560000-42597000 Deferred user32
PE 426b0000-426b4000 Deferred advapi32
PE 42d80000-42d84000 Deferred winex11
PE 42fb0000-42fb4000 Deferred imm32
PE 43140000-43143000 Deferred msvcr71
PE 43150000-43154000 Deferred msvcrt
PE 431f0000-431f4000 Deferred rpcrt4
PE 43280000-4328c000 Deferred wininet
PE 432e0000-432e8000 Deferred mpr
PE 43310000-43317000 Deferred shlwapi
PE 43380000-434b8000 Deferred shell32
PE 435a0000-435cb000 Deferred comctl32
PE 436b0000-436b4000 Deferred ws2_32
PE 436f0000-43752000 Deferred winmm
PE 43790000-43794000 Deferred uxtheme
PE 437c0000-437c4000 Deferred ole32
PE 7b810000-7b8f9000 Export kernel32
PE 7bc10000-7bc14000 Deferred ntdll
Threads:
process tid prio (all id:s are in hex)
00000008 pylotro.exe
0000001d 0
0000001c 0
00000009 0
0000000e services.exe
00000016 0
00000015 0
00000014 0
00000010 0
0000000f 0
00000011 winedevice.exe
00000018 0
00000017 0
00000013 0
00000012 0
00000019 explorer.exe
0000001a 0
0000001e (D) C:\windows\system32\rundll32.exe
0000001f 0 <==
Backtrace:
=>0 0x4316d100 (0x0033fd08)
1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
2 0x405a7f0a (0x0033fea8)
3 0x405a7e58 (0x0033fec8)
4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
6 0x7bc63e0c (0x0033ff48)
7 0x7bc64fea (0x0033ffc8)
8 0x7bc3d95e (0x0033ffe8)
Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x4316d100).
Register dump:
CS:0017 SS:001f DS:001f ES:001f FS:1007 GS:0037
EIP:4316d100 ESP:0033fcc0 EBP:0033fd08 EFLAGS:00010202( R- -- I - - - )
EAX:00000000 EBX:4316d0c9 ECX:0033fcc0 EDX:0002008a
ESI:10004bb0 EDI:00000001
Stack dump:
0x0033fcc0: 00220620 00000000 7b818699 7b8440dc
0x0033fcd0: 00133f90 00110000 00000000 00133f88
0x0033fce0: 00000001 10040734 00000010 00000010
0x0033fcf0: 0033fd9c 7b9698a0 0033fd18 404a72ac
0x0033fd00: 10004bb0 00000001 0033fe28 10004bbb
0x0033fd10: 0033fe48 10004bbb 10040734 404a765b
0200: sel=1007 base=7ffc0000 limit=00000fff 32-bit rw-
Backtrace:
=>0 0x4316d100 (0x0033fd08)
1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
2 0x404a7f0a (0x0033fea8)
3 0x404a7e58 (0x0033fec8)
4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
6 0x7bc63e0c (0x0033ff48)
7 0x7bc64fea (0x0033ffc8)
8 0x7bc3d95e (0x0033ffe8)
0x4316d100: movl 0x0(%eax),%edx
Modules:
Module Address Debug info Name (23 modules)
PE 340000- 352000 Deferred zlib1t
PE 10000000-100a3000 Export patchclient
PE 404a0000-404a3000 Deferred rundll32
PE 404b0000-404b4000 Deferred version
PE 40710000-40714000 Deferred gdi32
PE 42560000-42597000 Deferred user32
PE 426b0000-426b4000 Deferred advapi32
PE 42d80000-42d84000 Deferred winex11
PE 42fb0000-42fb4000 Deferred imm32
PE 43140000-43143000 Deferred msvcr71
PE 43150000-43154000 Deferred msvcrt
PE 431f0000-431f4000 Deferred rpcrt4
PE 43280000-4328c000 Deferred wininet
PE 432e0000-432e8000 Deferred mpr
PE 43310000-43317000 Deferred shlwapi
PE 43380000-434b8000 Deferred shell32
PE 435a0000-435cb000 Deferred comctl32
PE 436b0000-436b4000 Deferred ws2_32
PE 436f0000-43752000 Deferred winmm
PE 43790000-43794000 Deferred uxtheme
PE 437c0000-437c4000 Deferred ole32
PE 7b810000-7b8f9000 Export kernel32
PE 7bc10000-7bc14000 Deferred ntdll
Threads:
process tid prio (all id:s are in hex)
00000008 pylotro.exe
0000001d 0
0000001c 0
00000009 0
0000000e services.exe
00000016 0
00000015 0
00000014 0
00000010 0
0000000f 0
00000011 winedevice.exe
00000018 0
00000017 0
00000013 0
00000012 0
00000019 explorer.exe
0000001a 0
00000022 (D) C:\windows\system32\rundll32.exe
00000023 0 <==
Backtrace:
=>0 0x4316d100 (0x0033fd08)
1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
2 0x404a7f0a (0x0033fea8)
3 0x404a7e58 (0x0033fec8)
4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
6 0x7bc63e0c (0x0033ff48)
7 0x7bc64fea (0x0033ffc8)
8 0x7bc3d95e (0x0033ffe8)
Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x4316d100).
Register dump:
CS:0017 SS:001f DS:001f ES:001f FS:1007 GS:0037
EIP:4316d100 ESP:0033fcc0 EBP:0033fd08 EFLAGS:00010202( R- -- I - - - )
EAX:00000000 EBX:4316d0c9 ECX:0033fcc0 EDX:00030088
ESI:10004bb0 EDI:00000001
Stack dump:
0x0033fcc0: 00220620 00000000 7b818699 7b8440dc
0x0033fcd0: 00133f90 00110000 00000000 00133f88
0x0033fce0: 00000001 10040734 00000010 00000010
0x0033fcf0: 0033fd9c 7b9698a0 0033fd18 404a72ac
0x0033fd00: 10004bb0 00000001 0033fe28 10004bbb
0x0033fd10: 0033fe48 10004bbb 10040734 404a765b
0200: sel=1007 base=7ffc0000 limit=00000fff 32-bit rw-
Backtrace:
=>0 0x4316d100 (0x0033fd08)
1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
2 0x404a7f0a (0x0033fea8)
3 0x404a7e58 (0x0033fec8)
4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
6 0x7bc63e0c (0x0033ff48)
7 0x7bc64fea (0x0033ffc8)
8 0x7bc3d95e (0x0033ffe8)
0x4316d100: movl 0x0(%eax),%edx
Modules:
Module Address Debug info Name (23 modules)
PE 340000- 352000 Deferred zlib1t
PE 10000000-100a3000 Export patchclient
PE 404a0000-404a3000 Deferred rundll32
PE 404b0000-404b4000 Deferred version
PE 40710000-40714000 Deferred gdi32
PE 42560000-42597000 Deferred user32
PE 426b0000-426b4000 Deferred advapi32
PE 42d80000-42d84000 Deferred winex11
PE 42fb0000-42fb4000 Deferred imm32
PE 43140000-43143000 Deferred msvcr71
PE 43150000-43154000 Deferred msvcrt
PE 431f0000-431f4000 Deferred rpcrt4
PE 43280000-4328c000 Deferred wininet
PE 432e0000-432e8000 Deferred mpr
PE 43310000-43317000 Deferred shlwapi
PE 43380000-434b8000 Deferred shell32
PE 435a0000-435cb000 Deferred comctl32
PE 436b0000-436b4000 Deferred ws2_32
PE 436f0000-43752000 Deferred winmm
PE 43790000-43794000 Deferred uxtheme
PE 437c0000-437c4000 Deferred ole32
PE 7b810000-7b8f9000 Export kernel32
PE 7bc10000-7bc14000 Deferred ntdll
Threads:
process tid prio (all id:s are in hex)
00000008 pylotro.exe
0000001d 0
0000001c 0
00000009 0
0000000e services.exe
00000016 0
00000015 0
00000014 0
00000010 0
0000000f 0
00000011 winedevice.exe
00000018 0
00000017 0
00000013 0
00000012 0
00000019 explorer.exe
0000001a 0
00000026 (D) C:\windows\system32\rundll32.exe
00000027 0 <==
Backtrace:
=>0 0x4316d100 (0x0033fd08)
1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28)
2 0x404a7f0a (0x0033fea8)
3 0x404a7e58 (0x0033fec8)
4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8)
5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28)
6 0x7bc63e0c (0x0033ff48)
7 0x7bc64fea (0x0033ffc8)
8 0x7bc3d95e (0x0033ffe8)
*** Finished ***