Jump to content

BioShock Error...


neowillendit

Recommended Posts

Hi everyone, :hello:

My BioShock game has been crashing on my laptop lately and I haven't made any recent changes to it that could contribute. I have Windows XP SP3 w/ all critical updates and all updated drivers. The only thing I had running in the background was NOD32 AntiVirus v.3.0.669, and my automatic wallpaper changer, as I was disconnected from the internet while I do my gaming.

Could someone please review this Dr. Watson Log to try to figure out why this is happening?

-------------------------------------------------------------------------------------------------------

Application exception occurred:
App: C:\Program Files\BioShock\Builds\Release\Bioshock.exe (pid=3888)
When: 8/12/2008 @ 21:43:08.421
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: NONE
User Name: Richard
Terminal Session Id: 0
Number of Processors: 2
Processor Type: x86 Family 6 Model 15 Stepping 6
Windows Version: 5.1
Current Build: 2600
Service Pack: 3
Current Type: Multiprocessor Free
Registered Organization: None
Registered Owner: Richard

*----> Task List <----*
0 System Process
4 System
560 smss.exe
624 csrss.exe
656 winlogon.exe
700 services.exe
712 lsass.exe
872 Ati2evxx.exe
896 svchost.exe
964 svchost.exe
1012 svchost.exe
1064 svchost.exe
1164 svchost.exe
1248 Ati2evxx.exe
1364 ekrn.exe
1400 PD91Agent.exe
1456 wdfmgr.exe
1492 SpySweeper.exe
604 Explorer.EXE
1324 egui.exe
1808 Changer.exe
3888 Bioshock.exe
1888 drwtsn32.exe

*----> Module List <----*
(0000000000540000 - 00000000008af000: C:\WINDOWS\system32\d3dx9_33.dll
(00000000008b0000 - 00000000008c6000: C:\WINDOWS\system32\XINPUT1_3.dll
(0000000010000000 - 00000000100b1000: c:\progra~1\outpos~1\wl_hook.dll
(0000000010900000 - 0000000011435ec8: C:\Program Files\BioShock\Builds\Release\Bioshock.exe
(0000000018000000 - 0000000018038000: C:\Program Files\BioShock\Builds\Release\binkw32.dll
(000000004fdd0000 - 000000004ff76000: C:\WINDOWS\system32\d3d9.dll
(0000000059a60000 - 0000000059b01000: C:\WINDOWS\system32\dbghelp.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\COMCTL32.dll
(00000000688f0000 - 00000000688f9000: C:\WINDOWS\system32\HID.DLL
(000000006ce10000 - 000000006ce48000: C:\WINDOWS\system32\DINPUT8.dll
(000000006d990000 - 000000006d996000: C:\WINDOWS\system32\d3d8thk.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(0000000072cf0000 - 0000000072cf7000: C:\WINDOWS\system32\msadp32.acm
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(00000000732e0000 - 00000000732e5000: C:\WINDOWS\system32\RICHED32.DLL
(0000000073ee0000 - 0000000073ee4000: C:\WINDOWS\system32\KsUser.dll
(0000000073f10000 - 0000000073f6c000: C:\WINDOWS\system32\DSOUND.dll
(0000000074e30000 - 0000000074e9d000: C:\WINDOWS\system32\RICHED20.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\MSIMG32.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.dll
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076bf0000 - 0000000076bfb000: C:\WINDOWS\system32\PSAPI.DLL
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000077120000 - 00000000771ab000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000773d0000 - 00000000774d3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.5512_x-ww_35d4ce83\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a80000 - 0000000077b15000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f02000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f59000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(0000000078130000 - 00000000781cb000: C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6b128700\MSVCR80.dll
(000000007c420000 - 000000007c4a7000: C:\WINDOWS\WinSxS\x86_Microsoft.VC80.CRT_1fc8b3b9a1e18e3b_8.0.50727.762_x-ww_6b128700\MSVCP80.dll
(000000007c800000 - 000000007c8f6000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9af000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d7000: C:\WINDOWS\system32\SHELL32.dll
(000000007e410000 - 000000007e4a1000: C:\WINDOWS\system32\USER32.dll

*----> State Dump for Thread Id 0xf90 <----*

eax=002676a9 ebx=04822ac8 ecx=09c70000 edx=0007b155 esi=04822ac8 edi=116ec000
eip=10cf224a esp=0032c7c0 ebp=04822a00 iopl=0 nv up ei pl nz ac po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000216

*** WARNING: Unable to verify checksum for C:\Program Files\BioShock\Builds\Release\Bioshock.exe
*** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\BioShock\Builds\Release\Bioshock.exe
function: Bioshock
10cf2231 10648925 adc [ecx+ecx*4+0x25],ah
10cf2235 0000 add [eax],al
10cf2237 0000 add [eax],al
10cf2239 83ec1c sub esp,0x1c
10cf223c 53 push ebx
10cf223d 55 push ebp
10cf223e 8be9 mov ebp,ecx
10cf2240 8b8d88000000 mov ecx,[ebp+0x88]
10cf2246 56 push esi
10cf2247 8d0480 lea eax,[eax+eax*4]
FAULT ->10cf224a 837cc11c00 cmp dword ptr [ecx+eax*8+0x1c],0x0 ds:0023:0afab564=????????
10cf224f 8d34c1 lea esi,[ecx+eax*8]
10cf2252 57 push edi
10cf2253 0f854b020000 jne Bioshock+0x3f24a4 (10cf24a4)
10cf2259 833d60351e1100 cmp dword ptr [Bioshock+0x8e3560 (111e3560)],0x0
10cf2260 0f84f5010000 je Bioshock+0x3f245b (10cf245b)
10cf2266 833d58351e1100 cmp dword ptr [Bioshock+0x8e3558 (111e3558)],0x0
10cf226d 0f85e8010000 jne Bioshock+0x3f245b (10cf245b)
10cf2273 8b16 mov edx,[esi]
10cf2275 6a00 push 0x0
10cf2277 6a00 push 0x0

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
04822a00 00009978 06540aa0 00000000 00000000 Bioshock+0x3f224a

*----> Raw Stack Dump <----*
000000000032c7c0 c8 2a 82 04 b0 d6 d0 0f - c8 2a 82 04 01 00 00 00 .*.......*......
000000000032c7d0 b0 d6 d0 0f 4b 08 cc 10 - ec c7 32 00 01 00 00 00 ....K.....2.....
000000000032c7e0 00 c0 6e 11 c8 2a 82 04 - 48 c8 32 00 68 cc f6 10 ..n..*..H.2.h...
000000000032c7f0 ff ff ff ff 78 55 cc 10 - 55 b1 07 00 c8 2a 82 04 ....xU..U....*..
000000000032c800 aa 4e f8 ff 43 95 93 10 - ec c0 6e 11 c8 2a 82 04 .N..C.....n..*..
000000000032c810 00 c0 6e 11 c8 2a 82 04 - 08 00 00 00 08 00 00 00 ..n..*..........
000000000032c820 ab 64 cb 10 34 c8 32 00 - 00 c0 6e 11 00 d8 45 01 .d..4.2...n...E.
000000000032c830 c8 2a 82 04 56 00 00 00 - c8 2a 82 04 5d 1c 72 03 .*..V....*..].r.
000000000032c840 00 73 cd 03 2e ef 91 10 - c8 c8 32 00 68 bd f4 10 .s........2.h...
000000000032c850 ff ff ff ff 39 ec ce 10 - c8 2a 82 04 d4 c8 32 00 ....9....*....2.
000000000032c860 85 2d 00 00 00 00 00 00 - de cc 00 00 00 2a 82 04 .-...........*..
000000000032c870 84 1f e5 0c 85 2d 00 00 - 00 00 00 00 e2 22 cc 10 .....-......."..
000000000032c880 c6 a4 26 07 00 00 00 00 - c0 9f a8 09 00 00 00 00 ..&.............
000000000032c890 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000032c8a0 00 f6 b7 01 00 00 00 00 - 68 c8 32 00 00 00 00 00 ........h.2.....
000000000032c8b0 00 00 00 00 00 00 00 00 - 50 c9 f6 10 ff ff ff ff ........P.......
000000000032c8c0 85 2d 00 00 84 c8 32 00 - 04 c9 32 00 18 a2 f6 10 .-....2...2.....
000000000032c8d0 ff ff ff ff 10 c9 32 00 - d8 f5 cc 10 7c d8 32 00 ......2.....|.2.
000000000032c8e0 18 c9 32 00 00 00 00 00 - 08 00 00 00 20 1f e5 0c ..2......... ...
000000000032c8f0 06 00 00 00 14 d0 32 00 - 00 00 00 00 c0 9f a8 09 ......2.........

*----> State Dump for Thread Id 0xf8c <----*

eax=00000001 ebx=01b532e0 ecx=7c802600 edx=7c90e4f4 esi=000000ac edi=00000000
eip=7c90e4f4 esp=0207ff0c ebp=0207ff70 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0207ff70 7c802542 000000ac ffffffff 00000000 ntdll!KiFastSystemCallRet
0207ff84 10cd50af 000000ac ffffffff 10ce9cff kernel32!WaitForSingleObject+0x12
0207ffec 00000000 10cd5410 01b532e0 00000000 Bioshock+0x3d50af

*----> Raw Stack Dump <----*
000000000207ff0c 3c df 90 7c db 25 80 7c - ac 00 00 00 00 00 00 00 <..|.%.|........
000000000207ff1c 00 00 00 00 01 00 00 00 - 00 33 b5 01 e0 32 b5 01 .........3...2..
000000000207ff2c 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000207ff3c 10 00 00 00 50 88 8b 88 - 00 e0 fd 7f 00 80 fd 7f ....P...........
000000000207ff4c 00 e0 fd 7f 00 00 00 00 - 00 00 00 00 20 ff 07 02 ............ ...
000000000207ff5c 00 00 00 00 dc ff 07 02 - c0 9a 83 7c 08 26 80 7c ...........|.&.|
000000000207ff6c 00 00 00 00 84 ff 07 02 - 42 25 80 7c ac 00 00 00 ........B%.|....
000000000207ff7c ff ff ff ff 00 00 00 00 - ec ff 07 02 af 50 cd 10 .............P..
000000000207ff8c ac 00 00 00 ff ff ff ff - ff 9c ce 10 ff ff ff ff ................
000000000207ff9c 20 33 b5 01 98 19 b0 10 - e0 32 b5 01 df 51 cd 10 3.......2...Q..
000000000207ffac 68 d0 14 78 d0 1a 1c 78 - 19 54 cd 10 13 b7 80 7c h..x...x.T.....|
000000000207ffbc e0 32 b5 01 68 d0 14 78 - d0 1a 1c 78 e0 32 b5 01 .2..h..x...x.2..
000000000207ffcc 00 e0 fd 7f 00 46 bf 89 - c0 ff 07 02 18 a6 b0 88 .....F..........
000000000207ffdc ff ff ff ff c0 9a 83 7c - 20 b7 80 7c 00 00 00 00 .......| ..|....
000000000207ffec 00 00 00 00 00 00 00 00 - 10 54 cd 10 e0 32 b5 01 .........T...2..
000000000207fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000208000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000208001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000208002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000208003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xf74 <----*

eax=7ffdd000 ebx=01b53280 ecx=000000b8 edx=10cd50a0 esi=000000b8 edi=00000000
eip=7c90e4f4 esp=0237ff0c ebp=0237ff70 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0237ff70 7c802542 000000b8 ffffffff 00000000 ntdll!KiFastSystemCallRet
0237ff84 10cd50af 000000b8 ffffffff 10ce9cff kernel32!WaitForSingleObject+0x12
0237ffec 00000000 10cd5410 01b53280 00000000 Bioshock+0x3d50af

*----> Raw Stack Dump <----*
000000000237ff0c 3c df 90 7c db 25 80 7c - b8 00 00 00 00 00 00 00 <..|.%.|........
000000000237ff1c 00 00 00 00 01 00 00 00 - a0 32 b5 01 80 32 b5 01 .........2...2..
000000000237ff2c 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000237ff3c 10 00 00 00 d8 85 8a 88 - 00 d0 fd 7f 00 80 fd 7f ................
000000000237ff4c 00 d0 fd 7f 00 00 00 00 - 00 00 00 00 20 ff 37 02 ............ .7.
000000000237ff5c 00 00 00 00 dc ff 37 02 - c0 9a 83 7c 08 26 80 7c ......7....|.&.|
000000000237ff6c 00 00 00 00 84 ff 37 02 - 42 25 80 7c b8 00 00 00 ......7.B%.|....
000000000237ff7c ff ff ff ff 00 00 00 00 - ec ff 37 02 af 50 cd 10 ..........7..P..
000000000237ff8c b8 00 00 00 ff ff ff ff - ff 9c ce 10 ff ff ff ff ................
000000000237ff9c c0 32 b5 01 98 19 b0 10 - 80 32 b5 01 df 51 cd 10 .2.......2...Q..
000000000237ffac 00 00 00 00 00 00 00 00 - 19 54 cd 10 13 b7 80 7c .........T.....|
000000000237ffbc 80 32 b5 01 00 00 00 00 - 00 00 00 00 80 32 b5 01 .2...........2..
000000000237ffcc 00 d0 fd 7f 00 66 bf 89 - c0 ff 37 02 18 a6 b0 88 .....f....7.....
000000000237ffdc ff ff ff ff c0 9a 83 7c - 20 b7 80 7c 00 00 00 00 .......| ..|....
000000000237ffec 00 00 00 00 00 00 00 00 - 10 54 cd 10 80 32 b5 01 .........T...2..
000000000237fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000238000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000238001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000238002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000238003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xf98 <----*

eax=11025494 ebx=01b53220 ecx=01b53260 edx=10b903a0 esi=000000c4 edi=00000000
eip=7c90e4f4 esp=0267ff0c ebp=0267ff70 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0267ff70 7c802542 000000c4 ffffffff 00000000 ntdll!KiFastSystemCallRet
0267ff84 10cd50af 000000c4 ffffffff 10ce9cff kernel32!WaitForSingleObject+0x12
0267ffec 00000000 10cd5410 01b53220 00000000 Bioshock+0x3d50af

*----> Raw Stack Dump <----*
000000000267ff0c 3c df 90 7c db 25 80 7c - c4 00 00 00 00 00 00 00 <..|.%.|........
000000000267ff1c 00 00 00 00 01 00 00 00 - 40 32 b5 01 20 32 b5 01 ........@2.. 2..
000000000267ff2c 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000267ff3c 10 00 00 00 30 4a 7f 88 - 00 c0 fd 7f 00 80 fd 7f ....0J..........
000000000267ff4c 00 c0 fd 7f 00 00 00 00 - 00 00 00 00 20 ff 67 02 ............ .g.
000000000267ff5c 00 00 00 00 dc ff 67 02 - c0 9a 83 7c 08 26 80 7c ......g....|.&.|
000000000267ff6c 00 00 00 00 84 ff 67 02 - 42 25 80 7c c4 00 00 00 ......g.B%.|....
000000000267ff7c ff ff ff ff 00 00 00 00 - ec ff 67 02 af 50 cd 10 ..........g..P..
000000000267ff8c c4 00 00 00 ff ff ff ff - ff 9c ce 10 ff ff ff ff ................
000000000267ff9c 60 32 b5 01 98 19 b0 10 - 20 32 b5 01 df 51 cd 10 `2...... 2...Q..
000000000267ffac 00 00 00 00 00 00 00 00 - 19 54 cd 10 13 b7 80 7c .........T.....|
000000000267ffbc 20 32 b5 01 00 00 00 00 - 00 00 00 00 20 32 b5 01 2.......... 2..
000000000267ffcc 00 c0 fd 7f 00 66 bf 89 - c0 ff 67 02 68 63 aa 88 .....f....g.hc..
000000000267ffdc ff ff ff ff c0 9a 83 7c - 20 b7 80 7c 00 00 00 00 .......| ..|....
000000000267ffec 00 00 00 00 00 00 00 00 - 10 54 cd 10 20 32 b5 01 .........T.. 2..
000000000267fffc 00 00 00 00 09 01 f8 00 - 05 01 00 00 ee 00 ed 00 ................
000000000268000c f1 00 00 00 ee 00 f1 00 - ef 00 00 00 ec 00 ed 00 ................
000000000268001c ee 00 00 00 f0 00 ef 00 - f2 00 00 00 fe 00 ff 00 ................
000000000268002c fd 00 00 00 fd 00 00 01 - fe 00 00 00 0c 01 07 01 ................
000000000268003c 06 01 00 00 1d 00 1c 00 - 1e 00 00 00 ff 00 fe 00 ................

*----> State Dump for Thread Id 0xfa0 <----*

eax=72d230e8 ebx=068dfef8 ecx=00000095 edx=00370ba0 esi=00000000 edi=7ffd8000
eip=7c90e4f4 esp=068dfed0 ebp=068dff6c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv -
ChildEBP RetAddr Args to Child
068dff6c 7c80a105 00000002 068dffa4 00000000 ntdll!KiFastSystemCallRet
068dff88 72d2312a 00000002 068dffa4 00000000 kernel32!WaitForMultipleObjects+0x18
068dffb4 7c80b713 00000000 00000010 020a0014 wdmaud!midMessage+0x348
068dffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000068dfed0 2c df 90 7c 74 95 80 7c - 02 00 00 00 f8 fe 8d 06 ,..|t..|........
00000000068dfee0 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
00000000068dfef0 00 00 00 00 00 00 00 00 - 68 01 00 00 64 01 00 00 ........h...d...
00000000068dff00 44 af 81 88 28 4c 2d aa - 00 00 00 00 27 34 72 80 D...(L-.....'4r.
00000000068dff10 08 00 00 00 46 02 00 00 - 14 00 00 00 01 00 00 00 ....F...........
00000000068dff20 00 00 00 00 00 00 00 00 - 10 00 00 00 a8 ad 81 88 ................
00000000068dff30 dc ad 81 88 00 00 00 00 - 00 80 fd 7f 00 b0 fd 7f ................
00000000068dff40 a8 ad 81 88 00 00 00 00 - f8 fe 8d 06 b4 a0 4f 80 ..............O.
00000000068dff50 02 00 00 00 ec fe 8d 06 - 00 00 00 00 dc ff 8d 06 ................
00000000068dff60 c0 9a 83 7c 68 96 80 7c - 00 00 00 00 88 ff 8d 06 ...|h..|........
00000000068dff70 05 a1 80 7c 02 00 00 00 - a4 ff 8d 06 00 00 00 00 ...|............
00000000068dff80 ff ff ff ff 00 00 00 00 - b4 ff 8d 06 2a 31 d2 72 ............*1.r
00000000068dff90 02 00 00 00 a4 ff 8d 06 - 00 00 00 00 ff ff ff ff ................
00000000068dffa0 14 00 0a 02 68 01 00 00 - 64 01 00 00 f2 3e 72 80 ....h...d....>r.
00000000068dffb0 fc d9 90 7c ec ff 8d 06 - 13 b7 80 7c 00 00 00 00 ...|.......|....
00000000068dffc0 10 00 00 00 14 00 0a 02 - 00 00 00 00 00 b0 fd 7f ................
00000000068dffd0 00 46 bf 89 c0 ff 8d 06 - 68 63 aa 88 ff ff ff ff .F......hc......
00000000068dffe0 c0 9a 83 7c 20 b7 80 7c - 00 00 00 00 00 00 00 00 ...| ..|........
00000000068dfff0 00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00 .....0.r........
00000000068e0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xaa0 <----*

eax=73f1b2a1 ebx=0037dca8 ecx=ffffffff edx=7c9101c0 esi=00000000 edi=7ffd8000
eip=7c90e4f4 esp=06bdfd88 ebp=06bdfe24 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\DSOUND.dll -
ChildEBP RetAddr Args to Child
06bdfe24 7c80a105 00000040 06bdfe78 00000000 ntdll!KiFastSystemCallRet
06bdfe40 73f114a2 00000040 06bdfe78 00000000 kernel32!WaitForMultipleObjects+0x18
06bdfe58 73f12862 00000040 ffffffff 00000000 DSOUND+0x14a2
06bdff78 73f198df ffffffff 0000003f 00f65068 DSOUND+0x2862
06bdff98 73f12896 00f62270 00f63344 73f1b2e9 DSOUND!DirectSoundCreate+0x51a4
06bdffb4 7c80b713 00f63344 00f62270 00000000 DSOUND+0x2896
06bdffec 00000000 73f1b2a1 00f63344 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000006bdfd88 2c df 90 7c 74 95 80 7c - 40 00 00 00 a8 dc 37 00 ,..|t..|@.....7.
0000000006bdfd98 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000006bdfda8 40 00 00 00 01 00 00 00 - e3 a9 4e 80 00 90 fd 7f @.........N.....
0000000006bdfdb8 01 00 00 00 00 00 00 00 - 38 00 00 00 23 00 00 00 ........8...#...
0000000006bdfdc8 23 00 00 00 70 22 f6 00 - 14 00 00 00 01 00 00 00 #...p"..........
0000000006bdfdd8 00 00 00 00 00 00 00 00 - 10 00 00 00 f8 69 92 77 .............i.w
0000000006bdfde8 e9 06 81 7c 1b 00 00 00 - 00 80 fd 7f 00 a0 fd 7f ...|............
0000000006bdfdf8 00 a0 fd 7f 00 00 00 00 - a8 dc 37 00 df 6b 00 00 ..........7..k..
0000000006bdfe08 40 00 00 00 a4 fd bd 06 - 98 92 a8 88 dc ff bd 06 @...............
0000000006bdfe18 c0 9a 83 7c 68 96 80 7c - 00 00 00 00 40 fe bd 06 ...|h..|....@...
0000000006bdfe28 05 a1 80 7c 40 00 00 00 - 78 fe bd 06 00 00 00 00 ...|@...x.......
0000000006bdfe38 ff ff ff ff 00 00 00 00 - 58 fe bd 06 a2 14 f1 73 ........X......s
0000000006bdfe48 40 00 00 00 78 fe bd 06 - 00 00 00 00 ff ff ff ff @...x...........
0000000006bdfe58 78 ff bd 06 62 28 f1 73 - 40 00 00 00 ff ff ff ff x...b(.s@.......
0000000006bdfe68 00 00 00 00 78 fe bd 06 - 44 33 f6 00 44 33 f6 00 ....x...D3..D3..
0000000006bdfe78 a4 01 00 00 ac 02 00 00 - b0 02 00 00 a0 02 00 00 ................
0000000006bdfe88 8c 02 00 00 98 01 00 00 - 88 02 00 00 84 02 00 00 ................
0000000006bdfe98 80 02 00 00 7c 02 00 00 - 78 02 00 00 74 02 00 00 ....|...x...t...
0000000006bdfea8 70 02 00 00 6c 02 00 00 - 68 02 00 00 64 02 00 00 p...l...h...d...
0000000006bdfeb8 60 02 00 00 5c 02 00 00 - 58 02 00 00 54 02 00 00 `...\...X...T...

*----> State Dump for Thread Id 0xfb4 <----*

eax=12b80000 ebx=06edfdb8 ecx=06edfe6c edx=7c90e4f4 esi=00000000 edi=7ffd8000
eip=7c90e4f4 esp=06edfd90 ebp=06edfe2c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
06edfe2c 7c80a105 00000001 06edfe80 00000000 ntdll!KiFastSystemCallRet
06edfe48 73f114a2 00000001 06edfe80 00000000 kernel32!WaitForMultipleObjects+0x18
06edfe60 73f12862 00000001 000001f4 00000000 DSOUND+0x14a2
06edff80 73f1292b 000001f4 00000000 00000000 DSOUND+0x2862
06edffb4 7c80b713 00f61efc 00000000 7c910202 DSOUND+0x292b
06edffec 00000000 73f1b2a1 00f61efc 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000006edfd90 2c df 90 7c 74 95 80 7c - 01 00 00 00 b8 fd ed 06 ,..|t..|........
0000000006edfda0 01 00 00 00 00 00 00 00 - ec fd ed 06 00 00 00 00 ................
0000000006edfdb0 01 00 00 00 01 00 00 00 - 90 02 00 00 b6 95 80 7c ...............|
0000000006edfdc0 00 00 00 00 a4 95 80 7c - 38 6f f6 00 00 00 00 00 .......|8o......
0000000006edfdd0 00 00 00 00 9c 02 00 00 - 14 00 00 00 01 00 00 00 ................
0000000006edfde0 00 00 00 00 00 00 00 00 - 10 00 00 00 c0 b4 b3 ff ................
0000000006edfdf0 ff ff ff ff 84 fe ed 06 - 00 80 fd 7f 00 90 fd 7f ................
0000000006edfe00 a4 95 80 7c ec fd ed 06 - b8 fd ed 06 1c fe ed 06 ...|............
0000000006edfe10 01 00 00 00 ac fd ed 06 - 90 c2 f6 00 dc ff ed 06 ................
0000000006edfe20 c0 9a 83 7c 68 96 80 7c - 00 00 00 00 48 fe ed 06 ...|h..|....H...
0000000006edfe30 05 a1 80 7c 01 00 00 00 - 80 fe ed 06 00 00 00 00 ...|............
0000000006edfe40 f4 01 00 00 00 00 00 00 - 60 fe ed 06 a2 14 f1 73 ........`......s
0000000006edfe50 01 00 00 00 80 fe ed 06 - 00 00 00 00 f4 01 00 00 ................
0000000006edfe60 80 ff ed 06 62 28 f1 73 - 01 00 00 00 f4 01 00 00 ....b(.s........
0000000006edfe70 00 00 00 00 80 fe ed 06 - fc 1e f6 00 fc 1e f6 00 ................
0000000006edfe80 90 02 00 00 00 00 00 00 - 20 00 00 00 b4 fe ed 06 ........ .......
0000000006edfe90 01 00 00 00 00 00 00 00 - 02 00 00 00 00 00 00 00 ................
0000000006edfea0 00 00 00 00 c4 fe ed 06 - 2c df 90 7c 74 95 80 7c ........,..|t..|
0000000006edfeb0 00 90 fd 7f 44 ff ed 06 - b6 95 80 7c f0 fe ed 06 ....D......|....
0000000006edfec0 a4 95 80 7c 00 00 00 00 - fc 1e f6 00 fc 1e f6 00 ...|............

*----> State Dump for Thread Id 0xfc0 <----*

eax=012974b8 ebx=01288b74 ecx=0128d060 edx=01296de8 esi=0128cfc4 edi=01288b70
eip=10e91fef esp=071dfd44 ebp=071dfd48 iopl=0 nv up ei pl nz na po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000207

function: Bioshock
10e91fdb 5e pop esi
10e91fdc 5b pop ebx
10e91fdd c20400 ret 0x4
10e91fe0 55 push ebp
10e91fe1 8bec mov ebp,esp
10e91fe3 51 push ecx
10e91fe4 8b5110 mov edx,[ecx+0x10]
10e91fe7 8b4118 mov eax,[ecx+0x18]
10e91fea 8d0482 lea eax,[edx+eax*4]
10e91fed d900 fld dword ptr [eax]
10e91fef ba0000807f mov edx,0x7f800000
10e91ff4 d95dfc fstp dword ptr [ebp-0x4]
10e91ff7 8555fc test [ebp-0x4],edx
10e91ffa d9ee fldz
10e91ffc 7503 jnz Bioshock+0x592001 (10e92001)
10e91ffe d955fc fst dword ptr [ebp-0x4]
10e92001 d9410c fld dword ptr [ecx+0xc]
10e92004 d84dfc fmul dword ptr [ebp-0x4]
10e92007 d94108 fld dword ptr [ecx+0x8]
10e9200a d84904 fmul dword ptr [ecx+0x4]
10e9200d dec1 faddp st(1),st

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
071dfd48 10e920e5 00000000 012378a0 0128cec0 Bioshock+0x591fef
071dfd6c 10e64c65 0128d140 00000000 01237a20 Bioshock+0x5920e5
071dfd98 10e64f3a 012889f0 012378a0 00000400 Bioshock+0x564c65
071dfdb4 10e607c6 0128ced8 012889f0 012378a0 Bioshock+0x564f3a
071dfdfc 10e60520 012378a0 071dff08 071dff54 Bioshock+0x5607c6
071dfe44 10e60520 012398c0 001dff08 071dff54 Bioshock+0x560520
071dfe8c 10e60520 012378a0 071dff08 071dff54 Bioshock+0x560520
071dfed4 10e93462 0124e670 071dff08 071dff54 Bioshock+0x560520
071dff00 10e89949 012889f0 071dff58 071dff54 Bioshock+0x593462
071dff6c 10e8df13 00f69000 00000400 01233bec Bioshock+0x589949
071dffac 10e58dde 7c9101bb 7c80b713 01233bec Bioshock+0x58df13
071dffec 00000000 10e58d9d 01233bec 00000000 Bioshock+0x558dde

*----> Raw Stack Dump <----*
00000000071dfd44 60 d0 28 01 6c fd 1d 07 - e5 20 e9 10 00 00 00 00 `.(.l.... ......
00000000071dfd54 a0 78 23 01 c0 ce 28 01 - f0 89 28 01 08 00 00 00 .x#...(...(.....
00000000071dfd64 04 00 00 00 00 00 00 00 - 98 fd 1d 07 65 4c e6 10 ............eL..
00000000071dfd74 40 d1 28 01 00 00 00 00 - 20 7a 23 01 24 7a 23 01 @.(..... z#.$z#.
00000000071dfd84 cf 03 00 00 00 00 00 00 - 4c ff 1d 07 c0 ce 28 01 ........L.....(.
00000000071dfd94 08 ff 1d 07 b4 fd 1d 07 - 3a 4f e6 10 f0 89 28 01 ........:o....(.
00000000071dfda4 a0 78 23 01 00 04 00 00 - 02 00 00 00 02 00 00 00 .x#.............
00000000071dfdb4 fc fd 1d 07 c6 07 e6 10 - d8 ce 28 01 f0 89 28 01 ..........(...(.
00000000071dfdc4 a0 78 23 01 00 04 00 00 - 02 00 00 00 02 00 00 00 .x#.............
00000000071dfdd4 4c ff 1d 07 40 08 25 01 - 08 ff 1d 07 00 00 00 00 L...@.%.........
00000000071dfde4 00 00 00 00 c0 98 23 01 - 01 00 00 00 e0 ce 28 01 ......#.......(.
00000000071dfdf4 01 00 00 00 50 a3 24 01 - 44 fe 1d 07 20 05 e6 10 ....P.$.D... ...
00000000071dfe04 a0 78 23 01 08 ff 1d 07 - 54 ff 1d 07 02 00 00 00 .x#.....T.......
00000000071dfe14 f0 89 28 01 02 00 00 00 - 4c ff 1d 07 90 06 25 01 ..(.....L.....%.
00000000071dfe24 08 ff 1d 07 01 00 00 00 - 00 00 00 00 a0 78 23 01 .............x#.
00000000071dfe34 00 00 00 00 80 a0 24 01 - 01 00 00 00 80 a0 24 01 ......$.......$.
00000000071dfe44 8c fe 1d 07 20 05 e6 10 - c0 98 23 01 08 ff 1d 00 .... .....#.....
00000000071dfe54 54 ff 1d 07 02 00 00 00 - c0 67 28 01 02 00 00 00 T........g(.....
00000000071dfe64 4c ff 1d 07 40 e5 24 01 - 08 ff 1d 07 00 00 00 00 L...@.$.........
00000000071dfe74 00 00 00 00 c0 98 23 01 - 01 00 00 00 10 a7 24 01 ......#.......$.

*----> State Dump for Thread Id 0xfbc <----*

eax=112e5d88 ebx=112ee3a8 ecx=112ee4cc edx=0127f158 esi=00000000 edi=074dff60
eip=7c90e4f4 esp=074dff30 ebp=074dff88 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
074dff88 7c802455 0000000a 00000000 074dffec ntdll!KiFastSystemCallRet
074dff98 10e59123 0000000a 10e5fb85 0000000a kernel32!Sleep+0xf
074dffec 00000000 10e58d9d 112ee3a8 00000000 Bioshock+0x559123

*----> Raw Stack Dump <----*
00000000074dff30 fc d1 90 7c f1 23 80 7c - 00 00 00 00 60 ff 4d 07 ...|.#.|....`.M.
00000000074dff40 40 06 f6 00 a8 e3 2e 11 - a8 e3 2e 11 14 00 00 00 @...............
00000000074dff50 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
00000000074dff60 60 79 fe ff ff ff ff ff - 5e a6 af 00 60 ff 4d 07 `y......^...`.M.
00000000074dff70 40 ff 4d 07 99 9e 36 00 - dc ff 4d 07 c0 9a 83 7c @.M...6...M....|
00000000074dff80 60 24 80 7c 00 00 00 00 - 98 ff 4d 07 55 24 80 7c `$.|......M.U$.|
00000000074dff90 0a 00 00 00 00 00 00 00 - ec ff 4d 07 23 91 e5 10 ..........M.#...
00000000074dffa0 0a 00 00 00 85 fb e5 10 - 0a 00 00 00 ee 8d e5 10 ................
00000000074dffb0 0a 00 00 00 00 00 00 00 - 13 b7 80 7c a8 e3 2e 11 ...........|....
00000000074dffc0 40 06 f6 00 00 00 00 00 - a8 e3 2e 11 00 60 fd 7f @............`..
00000000074dffd0 00 46 bf 89 c0 ff 4d 07 - 38 fa ac 88 ff ff ff ff .F....M.8.......
00000000074dffe0 c0 9a 83 7c 20 b7 80 7c - 00 00 00 00 00 00 00 00 ...| ..|........
00000000074dfff0 00 00 00 00 9d 8d e5 10 - a8 e3 2e 11 00 00 00 00 ................
00000000074e0000 08 00 00 00 00 01 00 02 - ee ff ee ff 00 00 00 00 ................
00000000074e0010 00 00 f5 00 00 80 12 00 - 00 00 4e 07 00 02 00 00 ..........N.....
00000000074e0020 40 00 4e 07 00 00 6e 07 - 28 01 00 00 01 00 00 00 @.N...n.(.......
00000000074e0030 88 05 f5 00 00 00 00 00 - 00 d0 5a 07 00 00 00 00 ..........Z.....
00000000074e0040 26 32 08 00 20 01 08 02 - 18 91 01 00 00 00 00 00 &2.. ...........
00000000074e0050 00 00 00 00 00 00 00 00 - 3c cd 0b 11 5c 00 4e 07 ........<...\.N.
00000000074e0060 5c 00 4e 07 00 00 00 00 - 80 9a 22 01 88 5d 2e 11 \.N......."..]..

*----> State Dump for Thread Id 0xfb0 <----*

eax=00000000 ebx=049f8e00 ecx=01231760 edx=00000001 esi=000002d0 edi=00000000
eip=7c90e4f4 esp=079dff0c ebp=079dff70 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
079dff70 7c802542 000002d0 ffffffff 00000000 ntdll!KiFastSystemCallRet
079dff84 10cd50af 000002d0 ffffffff 10ce9cff kernel32!WaitForSingleObject+0x12
079dffec 00000000 10cd5410 049f8e00 00000000 Bioshock+0x3d50af

*----> Raw Stack Dump <----*
00000000079dff0c 3c df 90 7c db 25 80 7c - d0 02 00 00 00 00 00 00 <..|.%.|........
00000000079dff1c 00 00 00 00 01 00 00 00 - 20 8e 9f 04 00 8e 9f 04 ........ .......
00000000079dff2c 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000079dff3c 10 00 00 00 80 9a 22 01 - 14 00 00 00 00 80 fd 7f ......".........
00000000079dff4c 00 50 fd 7f 00 00 00 00 - a5 b5 81 47 20 ff 9d 07 .P.........G ...
00000000079dff5c 00 8e 9f 04 dc ff 9d 07 - c0 9a 83 7c 08 26 80 7c ...........|.&.|
00000000079dff6c 00 00 00 00 84 ff 9d 07 - 42 25 80 7c d0 02 00 00 ........B%.|....
00000000079dff7c ff ff ff ff 00 00 00 00 - ec ff 9d 07 af 50 cd 10 .............P..
00000000079dff8c d0 02 00 00 ff ff ff ff - ff 9c ce 10 ff ff ff ff ................
00000000079dff9c 40 8e 9f 04 98 19 b0 10 - 00 8e 9f 04 df 51 cd 10 @............Q..
00000000079dffac 38 d0 32 00 00 00 4e 07 - 19 54 cd 10 13 b7 80 7c 8.2...N..T.....|
00000000079dffbc 00 8e 9f 04 38 d0 32 00 - 00 00 4e 07 00 8e 9f 04 ....8.2...N.....
00000000079dffcc 00 50 fd 7f 00 66 bf 89 - c0 ff 9d 07 38 fa ac 88 .P...f......8...
00000000079dffdc ff ff ff ff c0 9a 83 7c - 20 b7 80 7c 00 00 00 00 .......| ..|....
00000000079dffec 00 00 00 00 00 00 00 00 - 10 54 cd 10 00 8e 9f 04 .........T......
00000000079dfffc 00 00 00 00 50 00 f5 00 - 50 00 f5 00 00 00 00 00 ....P...P.......
00000000079e000c 00 00 00 00 00 a0 1b 00 - 00 a0 1b 00 d0 0e 00 00 ................
00000000079e001c 00 0b 00 00 20 91 1b 00 - 00 00 00 00 00 00 00 00 .... ...........
00000000079e002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000079e003c 00 00 00 00 01 00 01 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xfd4 <----*

eax=1101893c ebx=049f8940 ecx=049f88e0 edx=10b01970 esi=000002e4 edi=00000000
eip=7c90e4f4 esp=0819ff0c ebp=0819ff70 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0819ff70 7c802542 000002e4 ffffffff 00000000 ntdll!KiFastSystemCallRet
0819ff84 10cd50af 000002e4 ffffffff 10ce9cff kernel32!WaitForSingleObject+0x12
0819ffec 00000000 10cd5410 049f8940 00000000 Bioshock+0x3d50af

*----> Raw Stack Dump <----*
000000000819ff0c 3c df 90 7c db 25 80 7c - e4 02 00 00 00 00 00 00 <..|.%.|........
000000000819ff1c 00 00 00 00 01 00 00 00 - 00 89 9f 04 40 89 9f 04 ............@...
000000000819ff2c 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000819ff3c 10 00 00 00 2c 24 fd 10 - 00 00 00 00 00 80 fd 7f ....,$..........
000000000819ff4c 00 f0 fa 7f 00 00 00 00 - 89 0c 00 00 20 ff 19 08 ............ ...
000000000819ff5c dc ff 19 08 dc ff 19 08 - c0 9a 83 7c 08 26 80 7c ...........|.&.|
000000000819ff6c 00 00 00 00 84 ff 19 08 - 42 25 80 7c e4 02 00 00 ........B%.|....
000000000819ff7c ff ff ff ff 00 00 00 00 - ec ff 19 08 af 50 cd 10 .............P..
000000000819ff8c e4 02 00 00 ff ff ff ff - ff 9c ce 10 ff ff ff ff ................
000000000819ff9c e0 88 9f 04 98 19 b0 10 - 40 89 9f 04 df 51 cd 10 ........@....Q..
000000000819ffac 00 00 00 00 00 00 00 00 - 19 54 cd 10 13 b7 80 7c .........T.....|
000000000819ffbc 40 89 9f 04 00 00 00 00 - 00 00 00 00 40 89 9f 04 @...........@...
000000000819ffcc 00 f0 fa 7f 00 46 bf 89 - c0 ff 19 08 98 a9 aa 88 .....F..........
000000000819ffdc ff ff ff ff c0 9a 83 7c - 20 b7 80 7c 00 00 00 00 .......| ..|....
000000000819ffec 00 00 00 00 00 00 00 00 - 10 54 cd 10 40 89 9f 04 .........T..@...
000000000819fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000081a000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000081a001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000081a002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000081a003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xfd0 <----*

eax=003639d8 ebx=0849fea0 ecx=0001000e edx=6ce3d6e0 esi=00000000 edi=7ffd8000
eip=7c90e4f4 esp=0849fe78 ebp=0849ff14 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\DINPUT8.dll -
ChildEBP RetAddr Args to Child
0849ff14 7e4195f9 00000001 0849ff3c 00000000 ntdll!KiFastSystemCallRet
0849ff70 6ce19a67 00000000 00000000 ffffffff USER32!GetLastInputInfo+0x105
0849ffb4 7c80b713 00363a28 7c912d58 00000000 DINPUT8+0x9a67
0849ffec 00000000 6ce199b1 00363a28 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000849fe78 2c df 90 7c 74 95 80 7c - 01 00 00 00 a0 fe 49 08 ,..|t..|......I.
000000000849fe88 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000849fe98 01 00 00 00 02 00 00 00 - 44 01 00 00 04 99 e1 6c ........D......l
000000000849fea8 10 ff 49 08 d9 8b 41 7e - 00 e0 fa 7f 10 ff 49 08 ..I...A~......I.
000000000849feb8 5a 88 41 7e d0 fe 49 08 - 14 00 00 00 01 00 00 00 Z.A~..I.........
000000000849fec8 00 00 00 00 00 00 00 00 - 10 00 00 00 01 00 00 00 ................
000000000849fed8 00 00 00 00 00 00 00 00 - 00 80 fd 7f 00 e0 fa 7f ................
000000000849fee8 10 00 00 00 00 00 00 00 - a0 fe 49 08 00 00 00 00 ..........I.....
000000000849fef8 01 00 00 00 94 fe 49 08 - 60 ff 49 08 dc ff 49 08 ......I.`.I...I.
000000000849ff08 c0 9a 83 7c 68 96 80 7c - 00 00 00 00 70 ff 49 08 ...|h..|....p.I.
000000000849ff18 f9 95 41 7e 01 00 00 00 - 3c ff 49 08 00 00 00 00 ..A~....<.I.....
000000000849ff28 ff ff ff ff 01 00 00 00 - 08 02 21 00 00 00 00 00 ..........!.....
000000000849ff38 a7 a0 80 7c 44 01 00 00 - a7 a0 80 7c 70 ff 49 08 ...|D......|p.I.
000000000849ff48 02 94 41 7e 98 ff 49 08 - 00 00 00 00 00 00 00 00 ..A~..I.........
000000000849ff58 00 00 00 00 01 00 00 00 - 00 00 00 00 01 00 00 00 ................
000000000849ff68 00 e0 fa 7f 44 01 00 00 - b4 ff 49 08 67 9a e1 6c ....D.....I.g..l
000000000849ff78 00 00 00 00 00 00 00 00 - ff ff ff ff ff 04 00 00 ................
000000000849ff88 3c ff 49 08 58 2d 91 7c - 00 00 00 00 28 3a 36 00 <.I.X-.|....(:6.
000000000849ff98 08 02 21 00 ff 00 00 00 - 01 00 00 00 31 02 37 5a ..!.........1.7Z
000000000849ffa8 e2 b8 d2 00 8d 03 00 00 - 1d 02 00 00 ec ff 49 08 ..............I.

*----> State Dump for Thread Id 0xff4 <----*

eax=00000000 ebx=049f3f60 ecx=003bdb50 edx=0268c020 esi=000000f0 edi=00000000
eip=7c90e4f4 esp=0a61ff0c ebp=0a61ff70 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0a61ff70 7c802542 000000f0 ffffffff 00000000 ntdll!KiFastSystemCallRet
0a61ff84 10cd50af 000000f0 ffffffff 10ce9cff kernel32!WaitForSingleObject+0x12
0a61ffec 00000000 10cd5410 049f3f60 00000000 Bioshock+0x3d50af

*----> Raw Stack Dump <----*
000000000a61ff0c 3c df 90 7c db 25 80 7c - f0 00 00 00 00 00 00 00 <..|.%.|........
000000000a61ff1c 00 00 00 00 01 00 00 00 - 80 ab 74 04 60 3f 9f 04 ..........t.`?..
000000000a61ff2c 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000a61ff3c 10 00 00 00 00 00 00 00 - d0 67 13 11 00 80 fd 7f .........g......
000000000a61ff4c 00 b0 fa 7f 00 00 00 00 - cd 48 b6 10 20 ff 61 0a .........H.. .a.
000000000a61ff5c 9c 49 f5 00 dc ff 61 0a - c0 9a 83 7c 08 26 80 7c .I....a....|.&.|
000000000a61ff6c 00 00 00 00 84 ff 61 0a - 42 25 80 7c f0 00 00 00 ......a.B%.|....
000000000a61ff7c ff ff ff ff 00 00 00 00 - ec ff 61 0a af 50 cd 10 ..........a..P..
000000000a61ff8c f0 00 00 00 ff ff ff ff - ff 9c ce 10 ff ff ff ff ................
000000000a61ff9c 10 9e ea 08 2c 0b b1 10 - 60 3f 9f 04 df 51 cd 10 ....,...`?...Q..
000000000a61ffac 10 00 00 00 00 00 00 00 - 19 54 cd 10 13 b7 80 7c .........T.....|
000000000a61ffbc 60 3f 9f 04 10 00 00 00 - 00 00 00 00 60 3f 9f 04 `?..........`?..
000000000a61ffcc 00 b0 fa 7f 00 46 bf 89 - c0 ff 61 0a 58 dd 69 88 .....F....a.X.i.
000000000a61ffdc ff ff ff ff c0 9a 83 7c - 20 b7 80 7c 00 00 00 00 .......| ..|....
000000000a61ffec 00 00 00 00 00 00 00 00 - 10 54 cd 10 60 3f 9f 04 .........T..`?..
000000000a61fffc 00 00 00 00 00 10 89 88 - 60 32 56 80 00 00 00 00 ........`2V.....
000000000a62000c 00 00 00 00 00 a0 b1 88 - 01 00 01 00 98 08 00 00 ................
000000000a62001c 00 00 00 00 08 ad 42 27 - 00 00 00 00 01 00 00 00 ......B'........
000000000a62002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000a62003c 00 00 00 00 22 00 00 00 - 00 00 00 00 00 00 00 00 ...."...........

*----> State Dump for Thread Id 0x1d0 <----*

eax=00000001 ebx=049f89c0 ecx=0a31ff80 edx=7c90e4f4 esi=00000000 edi=0a31ff4c
eip=7c90e4f4 esp=0a31ff1c ebp=0a31ff74 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0a31ff74 7c802455 00000042 00000000 0a31ffec ntdll!KiFastSystemCallRet
0a31ff84 10cd1382 00000042 00000042 00000000 kernel32!Sleep+0xf
0a31ffec 00000000 10cd5410 049f89c0 00000000 Bioshock+0x3d1382

*----> Raw Stack Dump <----*
000000000a31ff1c fc d1 90 7c f1 23 80 7c - 00 00 00 00 4c ff 31 0a ...|.#.|....L.1.
000000000a31ff2c 01 00 00 00 00 76 b2 03 - c0 89 9f 04 14 00 00 00 .....v..........
000000000a31ff3c 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
000000000a31ff4c e0 ed f5 ff ff ff ff ff - 1c ff 31 0a 4c ff 31 0a ..........1.L.1.
000000000a31ff5c 2c ff 31 0a c0 9a 83 7c - dc ff 31 0a c0 9a 83 7c ,.1....|..1....|
000000000a31ff6c 60 24 80 7c 00 00 00 00 - 84 ff 31 0a 55 24 80 7c `$.|......1.U$.|
000000000a31ff7c 42 00 00 00 00 00 00 00 - ec ff 31 0a 82 13 cd 10 B.........1.....
000000000a31ff8c 42 00 00 00 42 00 00 00 - 00 00 00 00 ee 04 ca 10 B...B...........
000000000a31ff9c 7f 02 88 3d c0 89 9f 04 - 89 88 88 3d df 51 cd 10 ...=.......=.Q..
000000000a31ffac 50 c6 32 00 ff ff ff ff - 19 54 cd 10 13 b7 80 7c P.2......T.....|
000000000a31ffbc c0 89 9f 04 50 c6 32 00 - ff ff ff ff c0 89 9f 04 ....P.2.........
000000000a31ffcc 00 40 fd 7f 00 46 bf 89 - c0 ff 31 0a 68 63 aa 88 .@...F....1.hc..
000000000a31ffdc ff ff ff ff c0 9a 83 7c - 20 b7 80 7c 00 00 00 00 .......| ..|....
000000000a31ffec 00 00 00 00 00 00 00 00 - 10 54 cd 10 c0 89 9f 04 .........T......
000000000a31fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000a32000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000a32001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000a32002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000a32003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000a32004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x6d4 <----*

eax=ffffffff ebx=7c901000 ecx=09ba9f88 edx=ffffffff esi=00000000 edi=0ae4ff2c
eip=7c90e4f4 esp=0ae4fefc ebp=0ae4ff54 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

function: ntdll!KiFastSystemCallRet
7c90e4da e829000000 call ntdll!RtlRaiseException (7c90e508)
7c90e4df 8b0424 mov eax,[esp]
7c90e4e2 8be5 mov esp,ebp
7c90e4e4 5d pop ebp
7c90e4e5 c3 ret
7c90e4e6 8da42400000000 lea esp,[esp]
7c90e4ed 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e4f0 8bd4 mov edx,esp
7c90e4f2 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e4f4 c3 ret
7c90e4f5 8da42400000000 lea esp,[esp]
7c90e4fc 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e500 8d542408 lea edx,[esp+0x8]
7c90e504 cd2e int 2e
7c90e506 c3 ret
7c90e507 90 nop
ntdll!RtlRaiseException:
7c90e508 55 push ebp
7c90e509 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0ae4ff54 7c802455 00000021 00000000 0ce51fa4 ntdll!KiFastSystemCallRet
0ae4ff64 10cd1382 00000021 00000021 00000000 kernel32!Sleep+0xf
0ce51fa4 ffffffff 00000000 00000000 00000318 Bioshock+0x3d1382
0c716300 0ce51fa4 7c97b168 0040ec20 00000001 0xffffffff
00000000 00000000 00000000 00000000 00000000 0xce51fa4

*----> Raw Stack Dump <----*
000000000ae4fefc fc d1 90 7c f1 23 80 7c - 00 00 00 00 2c ff e4 0a ...|.#.|....,...
000000000ae4ff0c e0 10 90 7c d0 5f 29 03 - 00 10 90 7c 14 00 00 00 ...|._)....|....
000000000ae4ff1c 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
000000000ae4ff2c f0 f6 fa ff ff ff ff ff - ff ff ff ff 2c ff e4 0a ............,...
000000000ae4ff3c 0c ff e4 0a 00 00 00 00 - 9c ff e4 0a c0 9a 83 7c ...............|
000000000ae4ff4c 60 24 80 7c 00 00 00 00 - 64 ff e4 0a 55 24 80 7c `$.|....d...U$.|
000000000ae4ff5c 21 00 00 00 00 00 00 00 - a4 1f e5 0c 82 13 cd 10 !...............
000000000ae4ff6c 21 00 00 00 21 00 00 00 - 00 00 00 00 73 11 b1 10 !...!.......s...
000000000ae4ff7c 7f 02 08 3d 01 00 00 00 - ec ff e4 0a c0 1f e5 0c ...=............
000000000ae4ff8c c0 1f e5 0c 5e 38 0e 3f - 00 00 00 3f a0 1f e5 0c ....^8.?...?....
000000000ae4ff9c dc ff e4 0a 90 77 f5 10 - ff ff ff ff df 51 cd 10 .....w.......Q..
000000000ae4ffac 0c 4c 6f 61 64 69 6e 67 - 19 54 cd 10 13 b7 80 7c .Loading.T.....|
000000000ae4ffbc c0 1f e5 0c 0c 4c 6f 61 - 64 69 6e 67 c0 1f e5 0c .....Loading....
000000000ae4ffcc 00 d0 fa 7f 00 66 bf 89 - c0 ff e4 0a 68 63 aa 88 .....f......hc..
000000000ae4ffdc ff ff ff ff c0 9a 83 7c - 20 b7 80 7c 00 00 00 00 .......| ..|....
000000000ae4ffec 00 00 00 00 00 00 00 00 - 10 54 cd 10 c0 1f e5 0c .........T......
000000000ae4fffc 00 00 00 00 e3 a1 00 00 - 00 00 00 00 00 00 00 00 ................
000000000ae5000c 00 00 00 00 70 00 6c 00 - 61 00 79 00 65 00 72 00 ....p.l.a.y.e.r.
000000000ae5001c 5f 00 68 00 61 00 6e 00 - 64 00 73 00 5f 00 65 00 _.h.a.n.d.s._.e.
000000000ae5002c 71 00 75 00 69 00 70 00 - 70 00 69 00 73 00 74 00 q.u.i.p.p.i.s.t.

*----> Symbol Table <----*
C:\Program Files\BioShock\Builds\Release\Bioshock.exe

Thank you for reviewing!! :hello:

Edited by puntoMX
Code tags, thank you.
Link to comment
Share on other sites


Wow, that was ugly - next time just attach the .dmp files :).

Anyway, the error is c0000005, which means "access denied". So bioshock.exe was doing a compare of some register math and 0, and what it's doing makes me think that the memory that AFAB564 points to is probably invalid:

cmp dword ptr [ecx+eax*8+0x1c],0x0 ds:0023:0afab564=????????

Which really means:

cmp == compare operation

dword ptr == the address to compare will be a dword-aligned pointer

[ecx (09c70000) + eax*8 (002676a9) + 0x1c] == the address of the pointer (which is 0afab564)

,0x0 == compare the data the memory address points to with 0

However, as you can see above, 0afab5640 points to a memory address that contains no data (=????????) which causes the access violation. So, I'd contact the folks at 2KGames that make Bioshock and ask them what happened, because they are expecting the math above to return a pointer that == 0x0, not ???????? :).

Link to comment
Share on other sites

OK, well most of that was over my head... :wacko:

For now I disabled Dr. Watson (becuase even though it's not the problem...it can contribute to the porblem), and since then the game's been working as it should.

Do you think that's a good idea for now...because I don't expect 2kGames to really care about this since they're currently working on the sequel and they couldn't even get the last patch coded correctly...or release a SDK so we could mod...they made a great game but I don't expect any more support from them anymore.

Thank you for the reply and reviewing that for me, and please let me know about Dr. Watson. :hello:

Link to comment
Share on other sites

  • 1 month later...
OK, well most of that was over my head... :wacko:

For now I disabled Dr. Watson (becuase even though it's not the problem...it can contribute to the porblem), and since then the game's been working as it should.

Do you think that's a good idea for now...because I don't expect 2kGames to really care about this since they're currently working on the sequel and they couldn't even get the last patch coded correctly...or release a SDK so we could mod...they made a great game but I don't expect any more support from them anymore.

Thank you for the reply and reviewing that for me, and please let me know about Dr. Watson. :hello:

Uninstall and re-install ;) sounds like the most stupid idea ever! But you know what! it normally works ;)

Link to comment
Share on other sites

Create an account or sign in to comment

You need to be a member in order to leave a comment

Create an account

Sign up for a new account in our community. It's easy!

Register a new account

Sign in

Already have an account? Sign in here.

Sign In Now
  • Recently Browsing   0 members

    • No registered users viewing this page.
×
×
  • Create New...