Opened log file 'c:\Debug\20111012_095255_Crash_Mode\ADPlus_log_1588_2011-10-12_09-52-55-387.log' 0:009> as AdpOutputDir c:\Debug 0:009> as AdpDumpDirEsc c:\\Debug\\20111012_095255_Crash_Mode 0:009> as AdpTimeStamp 20111012_095255 0:009> * 0:009> *----- OS and Time Information ---- 0:009> vertarget Windows 7 Version 7601 (Service Pack 1) MP (4 procs) Free x64 Product: WinNt, suite: SingleUserTS Personal kernel32.dll version: 6.1.7601.17651 (win7sp1_gdr.110715-1504) Machine Name: Debug session time: Wed Oct 12 09:52:55.391 2011 (UTC - 5:00) System Uptime: 0 days 2:44:17.718 Process Uptime: 0 days 0:06:36.266 Kernel time: 0 days 0:00:01.435 User time: 0 days 0:00:06.567 0:009> * 0:009> * 0:009> *----- ADPlus information ---- 0:009> * 0:009> * ADPlus version: 7.01.002 02/27/2009 0:009> * 0:009> *-------------- Current settings ----------- 0:009> *| 0:009> *| ADPlus built-in key words: 0:009> *| CUSTOMDUMP = /mdi 0:009> *| CUSTOMDUMPOVER = 0:009> *| DLLS = !dlls 0:009> *| EVENTLOG = !elog_str 0:009> *| FULLDUMP = /ma 0:009> *| FULLDUMPOVER = 0:009> *| HANDLE = !handle 0 0 0:009> *| HEAP = !heap 0 -k 0:009> *| LOADEDMODULES = lmv 0:009> *| LOCKS = !locks 0:009> *| LOG = 0:009> *| MATCHINGSYMBOLS = lml 0:009> *| MINIDUMP = /mdi 0:009> *| MINIDUMPOVER = 0:009> *| NOTIFY = !net_send 0:009> *| STACK = kvn250 0:009> *| STACKS = 0:009> *| THREADTIME = .ttime 0:009> *| THREADUSAGE = !runaway 0:009> *| TIME = .time 0:009> *| VOID = 0:009> *| 0:009> *| Default Exception Behavior: 0:009> *| Action1: Log;Time;Stack;MiniDump 0:009> *| Return1: GN 0:009> *| Action2: Log;Time;Stack;FullDump;EventLog 0:009> *| Return2: GN 0:009> *| Default Event Behavior: 0:009> *| Action1: Log 0:009> *| Return1: GN 0:009> *| 0:009> *| Exceptions: 0:009> *| av-AccessViolation 0:009> *| Default behavior 0:009> *| ch-InvalidHandle 0:009> *| Default behavior 0:009> *| ii-IllegalInstruction 0:009> *| Default behavior 0:009> *| dz-IntegerDivide 0:009> *| Default behavior 0:009> *| c000008e-FloatingDivide 0:009> *| Default behavior 0:009> *| iov-IntegerOverflow 0:009> *| Default behavior 0:009> *| lsq-InvalidLockSequence 0:009> *| Default behavior 0:009> *| sov-StackOverflow 0:009> *| Default behavior 0:009> *| aph-Application_hang 0:009> *| Default behavior 0:009> *| cce-Ctl_C_Console_app 0:009> *| Default event behavior 0:009> *| dm-Data_misaligned 0:009> *| Default behavior 0:009> *| gp-Guard_page_violation 0:009> *| Default behavior 0:009> *| ip-In_page_IO_error 0:009> *| Default behavior 0:009> *| isc-Invalid_system_call 0:009> *| Default behavior 0:009> *| sbo-Stack_buffer_overflow 0:009> *| Default behavior 0:009> *| eh-CPlusPlusEH 0:009> *| Action1: Log;Time;Stack 0:009> *| Return1: GN 0:009> *| Action2: Log;Time;Stack;FullDump;EventLog 0:009> *| Return2: GN 0:009> *| *-UnknownException 0:009> *| Action1: Log;Time;Stack 0:009> *| Return1: GN 0:009> *| Action2: Log;Time;Stack;FullDump;EventLog 0:009> *| Return2: GN 0:009> *| clr-NET_CLR 0:009> *| Action1: VOID 0:009> *| Return1: GN 0:009> *| Action2: Log;Time;Stack;FullDump;EventLog 0:009> *| Return2: GN 0:009> *| bpe-CONTRL_C_OR_Debug_Break 0:009> *| Action1: Log;Time;Stacks;MiniDump 0:009> *| Return1: VOID 0:009> *| wkd-Wake_Debugger 0:009> *| Action1: Log;Time;Stacks;MiniDump 0:009> *| Return1: GN 0:009> *| ld-DLL_Load 0:009> *| Default event behavior 0:009> *| ud-DLL_UnLoad 0:009> *| Default event behavior 0:009> *| epr-Process_Shut_Down 0:009> *| Action1: Log;Time;EventLog;Stacks;FullDump;ThreadUsage 0:009> *| Return1: Q 0:009> *| 0:009> *| Last script command: 0:009> *| Debugger: cdb.exe 0:009> *| 0:009> *| Quiet mode = True 0:009> *| 0:009> *-------------- End of current settings ----------- 0:009> .printf "%d", @$tpid 50720:009> !adplusext.adpextstart AdpDumpDir Starting ADPlusExt ADPlusExt Version 1.0 initialized 0:009> * 0:009> as /c AdpProcID !adplusext.adpprocid 0:009> as /c AdpHostComputer !adplusext.adphostcomputer 0:009> * 0:009> as /c AdpTargetComputer !adplusext.adptargetcomputer 0:009> * 0:009> as /c AdpProcName !adplusext.adpprocname 0:009> * 0:009> * 0:009> *---Current Aliases--- 0:009> al Alias Value ------- ------- $arg0 c:\Debug\20111012_095255_Crash_Mode\DebuggerScript.txt AdpDumpDir c:\Debug\20111012_095255_Crash_Mode AdpDumpDirEsc c:\\Debug\\20111012_095255_Crash_Mode AdpHostComputer MAIN-WIN7 AdpOutputDir c:\Debug AdpProcID 5072 AdpProcName blender.exe AdpTargetComputer MAIN-WIN7 AdpTimeStamp 20111012_095255 0:009> * 0:009> *---Current Symbol Path--- 0:009> .sympath Symbol search path is: Expanded Symbol search path is: 0:009> *--- Configuring exceptions --- 0:009> sxe -c @".echo FirstChance_av_AccessViolation;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_av_AccessViolation ${AdpDumpDir}\MINIDUMP_FirstChance_av_AccessViolation_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_av_AccessViolation;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_av_AccessViolation ${AdpDumpDir}\FULLDUMP_SecondChance_av_AccessViolation_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_av_AccessViolation in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" av 0:009> sxe -c @".echo FirstChance_ch_InvalidHandle;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_ch_InvalidHandle ${AdpDumpDir}\MINIDUMP_FirstChance_ch_InvalidHandle_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_ch_InvalidHandle;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_ch_InvalidHandle ${AdpDumpDir}\FULLDUMP_SecondChance_ch_InvalidHandle_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_ch_InvalidHandle in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" ch 0:009> sxe -c @".echo FirstChance_ii_IllegalInstruction;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_ii_IllegalInstruction ${AdpDumpDir}\MINIDUMP_FirstChance_ii_IllegalInstruction_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_ii_IllegalInstruction;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_ii_IllegalInstruction ${AdpDumpDir}\FULLDUMP_SecondChance_ii_IllegalInstruction_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_ii_IllegalInstruction in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" ii 0:009> sxe -c @".echo FirstChance_dz_IntegerDivide;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_dz_IntegerDivide ${AdpDumpDir}\MINIDUMP_FirstChance_dz_IntegerDivide_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_dz_IntegerDivide;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_dz_IntegerDivide ${AdpDumpDir}\FULLDUMP_SecondChance_dz_IntegerDivide_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_dz_IntegerDivide in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" dz 0:009> sxe -c @".echo FirstChance_c000008e_FloatingDivide;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_c000008e_FloatingDivide ${AdpDumpDir}\MINIDUMP_FirstChance_c000008e_FloatingDivide_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_c000008e_FloatingDivide;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_c000008e_FloatingDivide ${AdpDumpDir}\FULLDUMP_SecondChance_c000008e_FloatingDivide_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_c000008e_FloatingDivide in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" c000008e 0:009> sxe -c @".echo FirstChance_iov_IntegerOverflow;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_iov_IntegerOverflow ${AdpDumpDir}\MINIDUMP_FirstChance_iov_IntegerOverflow_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_iov_IntegerOverflow;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_iov_IntegerOverflow ${AdpDumpDir}\FULLDUMP_SecondChance_iov_IntegerOverflow_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_iov_IntegerOverflow in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" iov 0:009> sxe -c @".echo FirstChance_lsq_InvalidLockSequence;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_lsq_InvalidLockSequence ${AdpDumpDir}\MINIDUMP_FirstChance_lsq_InvalidLockSequence_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_lsq_InvalidLockSequence;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_lsq_InvalidLockSequence ${AdpDumpDir}\FULLDUMP_SecondChance_lsq_InvalidLockSequence_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_lsq_InvalidLockSequence in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" lsq 0:009> sxe -c @".echo FirstChance_sov_StackOverflow;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_sov_StackOverflow ${AdpDumpDir}\MINIDUMP_FirstChance_sov_StackOverflow_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_sov_StackOverflow;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_sov_StackOverflow ${AdpDumpDir}\FULLDUMP_SecondChance_sov_StackOverflow_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_sov_StackOverflow in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" sov 0:009> sxe -c @".echo FirstChance_aph_Application_hang;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_aph_Application_hang ${AdpDumpDir}\MINIDUMP_FirstChance_aph_Application_hang_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_aph_Application_hang;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_aph_Application_hang ${AdpDumpDir}\FULLDUMP_SecondChance_aph_Application_hang_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_aph_Application_hang in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" aph 0:009> sxi -c @".echo FirstChance_cce_Ctl_C_Console_app;;GN" cce 0:009> sxe -c @".echo FirstChance_dm_Data_misaligned;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_dm_Data_misaligned ${AdpDumpDir}\MINIDUMP_FirstChance_dm_Data_misaligned_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_dm_Data_misaligned;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_dm_Data_misaligned ${AdpDumpDir}\FULLDUMP_SecondChance_dm_Data_misaligned_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_dm_Data_misaligned in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" dm 0:009> sxe -c @".echo FirstChance_gp_Guard_page_violation;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_gp_Guard_page_violation ${AdpDumpDir}\MINIDUMP_FirstChance_gp_Guard_page_violation_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_gp_Guard_page_violation;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_gp_Guard_page_violation ${AdpDumpDir}\FULLDUMP_SecondChance_gp_Guard_page_violation_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_gp_Guard_page_violation in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" gp 0:009> sxe -c @".echo FirstChance_ip_In_page_IO_error;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_ip_In_page_IO_error ${AdpDumpDir}\MINIDUMP_FirstChance_ip_In_page_IO_error_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_ip_In_page_IO_error;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_ip_In_page_IO_error ${AdpDumpDir}\FULLDUMP_SecondChance_ip_In_page_IO_error_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_ip_In_page_IO_error in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" ip 0:009> sxe -c @".echo FirstChance_isc_Invalid_system_call;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_isc_Invalid_system_call ${AdpDumpDir}\MINIDUMP_FirstChance_isc_Invalid_system_call_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_isc_Invalid_system_call;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_isc_Invalid_system_call ${AdpDumpDir}\FULLDUMP_SecondChance_isc_Invalid_system_call_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_isc_Invalid_system_call in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" isc 0:009> sxe -c @".echo FirstChance_sbo_Stack_buffer_overflow;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /mdi /c FirstChance_sbo_Stack_buffer_overflow ${AdpDumpDir}\MINIDUMP_FirstChance_sbo_Stack_buffer_overflow_${AdpProcName}_.dmp;GN" -c2 @".echo SecondChance_sbo_Stack_buffer_overflow;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_sbo_Stack_buffer_overflow ${AdpDumpDir}\FULLDUMP_SecondChance_sbo_Stack_buffer_overflow_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_sbo_Stack_buffer_overflow in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" sbo 0:009> sxe -c @".echo FirstChance_eh_CPlusPlusEH;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;;GN" -c2 @".echo SecondChance_eh_CPlusPlusEH;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_eh_CPlusPlusEH ${AdpDumpDir}\FULLDUMP_SecondChance_eh_CPlusPlusEH_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_eh_CPlusPlusEH in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" eh 0:009> sxe -c @".echo FirstChance_*_UnknownException;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;;GN" -c2 @".echo SecondChance_*_UnknownException;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_*_UnknownException ${AdpDumpDir}\FULLDUMP_SecondChance_*_UnknownException_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_*_UnknownException in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" * 0:009> sxi -c @"GN" -c2 @".echo SecondChance_clr_NET_CLR;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stack below ---;kvn250;.echo;.dump -u /ma /c SecondChance_clr_NET_CLR ${AdpDumpDir}\FULLDUMP_SecondChance_clr_NET_CLR_${AdpProcName}_.dmp;!elog_str ADPlus detected a SecondChance_clr_NET_CLR in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;GN" clr 0:009> sxi -c @".echo FirstChance_bpe_CONTRL_C_OR_Debug_Break;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stacks below ---;~*kvn250;.echo;.dump -u /mdi /c FirstChance_bpe_CONTRL_C_OR_Debug_Break ${AdpDumpDir}\MINIDUMP_FirstChance_bpe_CONTRL_C_OR_Debug_Break_${AdpProcName}_.dmp" bpe 0:009> sxi -c @".echo FirstChance_wkd_Wake_Debugger;.echo;.echo Current time: ;.time;.echo;.echo;.echo Call stacks below ---;~*kvn250;.echo;.dump -u /mdi /c FirstChance_wkd_Wake_Debugger ${AdpDumpDir}\MINIDUMP_FirstChance_wkd_Wake_Debugger_${AdpProcName}_.dmp;GN" wkd 0:009> sxi -c @".echo FirstChance_ld_DLL_Load;;GN" ld 0:009> sxn -c @".echo FirstChance_ud_DLL_UnLoad;;GN" ud 0:009> sxi -c @".echo FirstChance_epr_Process_Shut_Down;.echo;.echo Current time: ;.time;.echo;!elog_str ADPlus detected a FirstChance_epr_Process_Shut_Down in AdpProcName with Process ID AdpProcID and the output directory is AdpDumpDir;.echo;.echo Call stacks below ---;~*kvn250;.echo;.dump -u /ma /c FirstChance_epr_Process_Shut_Down ${AdpDumpDir}\FULLDUMP_FirstChance_epr_Process_Shut_Down_${AdpProcName}_.dmp;.echo;.echo Thread Usage Information: ;!runaway;.echo;;Q" epr 0:009> g FirstChance_ld_DLL_Load FirstChance_ld_DLL_Load (13d0.16b0): Access violation - code c0000005 (first chance) FirstChance_av_AccessViolation Current time: Debug session time: Wed Oct 12 09:54:40.426 2011 (UTC - 5:00) System Uptime: 0 days 2:46:02.753 Process Uptime: 0 days 0:08:21.301 Kernel time: 0 days 0:00:04.539 User time: 0 days 0:01:47.469 Call stack below --- *** WARNING: Unable to verify checksum for C:\Users\main\Desktop\blender259\blender.exe *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Users\main\Desktop\blender259\blender.exe - # Child-SP RetAddr : Args to Child : Call Site 00 00000000`0022f180 00000001`406a2541 : 00000000`03944250 00000000`03944250 00000000`0d7b9570 00000000`03944250 : blender!PyInit_aud+0x168dac 01 00000000`0022f210 00000001`406a2a32 : 00000000`03944250 00000000`0e5370c0 00000000`00000001 00000000`0022f3c8 : blender!turbulence1+0x1aa931 02 00000000`0022f2c0 00000001`406e614e : 00000000`0e5370c0 00000000`0df30d80 00000000`0e5370d8 00000000`0df30d80 : blender!turbulence1+0x1aae22 03 00000000`0022f4c0 00000001`406665a6 : 00000000`0de33150 00000001`412c3398 00000000`0cc06b40 00000000`0cc3e6a0 : blender!turbulence1+0x1ee53e 04 00000000`0022f530 00000001`406122f8 : 00000000`0cc44798 00000000`00000000 00000000`0389b108 00000000`0cd855c8 : blender!turbulence1+0x16e996 05 00000000`0022f5e0 00000001`40068bdb : 00000000`0357f128 449dc800`44d26000 00000000`0389b108 00000000`0357f128 : blender!turbulence1+0x11a6e8 06 00000000`0022fc20 00000001`40008c47 : 00000000`0357f128 00000000`00000008 00000000`0cd856d0 00000000`03a98748 : blender+0x68bdb 07 00000000`0022fca0 00000001`40009a99 : 00000000`0d374b38 00000000`00000008 00000000`00000000 00000000`0357f128 : blender+0x8c47 08 00000000`0022fcf0 00000001`40009f98 : 00000000`0af07438 00000000`00000000 00000000`0356f000 00000000`039e03f8 : blender+0x9a99 09 00000000`0022fd60 00000001`4000a9ed : 00000000`0357f128 00000000`0d374b38 00000000`0cd856d0 00000000`00000000 : blender+0x9f98 0a 00000000`0022fdd0 00000001`400043b0 : 00000000`0357f128 00000000`0ae5aa98 00000000`00000000 00000000`00000000 : blender+0xa9ed 0b 00000000`0022fea0 00000001`40001233 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : blender+0x43b0 0c 00000000`0022fed0 00000001`40a8ecd3 : 00000000`00000001 00000000`02465bb0 00000000`00000000 00000000`00000000 : blender+0x1233 *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Windows\system32\kernel32.dll - 0d 00000000`0022ff20 00000000`76f9652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : blender!PyInit_aud+0x158683 0e 00000000`0022ff60 00000000`7768c521 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd 0f 00000000`0022ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21 Creating c:\Debug\20111012_095255_Crash_Mode\MINIDUMP_FirstChance_av_AccessViolation_blender.exe__1588_2011-10-12_09-54-40-465_13d0.dmp - mini user dump Dump successfully written (13d0.16b0): C++ EH exception - code e06d7363 (first chance) FirstChance_eh_CPlusPlusEH Current time: Debug session time: Wed Oct 12 09:54:40.655 2011 (UTC - 5:00) System Uptime: 0 days 2:46:02.982 Process Uptime: 0 days 0:08:21.530 Kernel time: 0 days 0:00:04.539 User time: 0 days 0:01:47.469 Call stack below --- *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Windows\system32\KERNELBASE.dll - # Child-SP RetAddr : Args to Child : Call Site 00 00000000`0022f040 00000001`40a972ba : 00000000`0022f1c0 00000000`0022f180 00000000`00000001 00000001`40000130 : KERNELBASE!RaiseException+0x3d 01 00000000`0022f110 00000001`40a9f546 : 00000001`40000000 00000000`00000000 00000000`0d7b9570 00000000`0e5370c0 : blender!PyInit_aud+0x160c6a 02 00000000`0022f180 00000001`406a2541 : 00000000`03944250 00000000`03944250 00000000`0d7b9570 00000000`03944250 : blender!PyInit_aud+0x168ef6 03 00000000`0022f210 00000001`406a2a32 : 00000000`03944250 00000000`0e5370c0 00000000`00000001 00000000`0022f3c8 : blender!turbulence1+0x1aa931 04 00000000`0022f2c0 00000001`406e614e : 00000000`0e5370c0 00000000`0df30d80 00000000`0e5370d8 00000000`0df30d80 : blender!turbulence1+0x1aae22 05 00000000`0022f4c0 00000001`406665a6 : 00000000`0de33150 00000001`412c3398 00000000`0cc06b40 00000000`0cc3e6a0 : blender!turbulence1+0x1ee53e 06 00000000`0022f530 00000001`406122f8 : 00000000`0cc44798 00000000`00000000 00000000`0389b108 00000000`0cd855c8 : blender!turbulence1+0x16e996 07 00000000`0022f5e0 00000001`40068bdb : 00000000`0357f128 449dc800`44d26000 00000000`0389b108 00000000`0357f128 : blender!turbulence1+0x11a6e8 08 00000000`0022fc20 00000001`40008c47 : 00000000`0357f128 00000000`00000008 00000000`0cd856d0 00000000`03a98748 : blender+0x68bdb 09 00000000`0022fca0 00000001`40009a99 : 00000000`0d374b38 00000000`00000008 00000000`00000000 00000000`0357f128 : blender+0x8c47 0a 00000000`0022fcf0 00000001`40009f98 : 00000000`0af07438 00000000`00000000 00000000`0356f000 00000000`039e03f8 : blender+0x9a99 0b 00000000`0022fd60 00000001`4000a9ed : 00000000`0357f128 00000000`0d374b38 00000000`0cd856d0 00000000`00000000 : blender+0x9f98 0c 00000000`0022fdd0 00000001`400043b0 : 00000000`0357f128 00000000`0ae5aa98 00000000`00000000 00000000`00000000 : blender+0xa9ed 0d 00000000`0022fea0 00000001`40001233 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : blender+0x43b0 0e 00000000`0022fed0 00000001`40a8ecd3 : 00000000`00000001 00000000`02465bb0 00000000`00000000 00000000`00000000 : blender+0x1233 0f 00000000`0022ff20 00000000`76f9652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : blender!PyInit_aud+0x158683 10 00000000`0022ff60 00000000`7768c521 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd 11 00000000`0022ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21 (13d0.16b0): C++ EH exception - code e06d7363 (!!! second chance !!!) SecondChance_eh_CPlusPlusEH Current time: Debug session time: Wed Oct 12 09:54:40.676 2011 (UTC - 5:00) System Uptime: 0 days 2:46:03.003 Process Uptime: 0 days 0:08:21.551 Kernel time: 0 days 0:00:04.539 User time: 0 days 0:01:47.469 Call stack below --- # Child-SP RetAddr : Args to Child : Call Site 00 00000000`0022f040 00000001`40a972ba : 00000000`0022f1c0 00000000`0022f180 00000000`00000001 00000001`40000130 : KERNELBASE!RaiseException+0x3d 01 00000000`0022f110 00000001`40a9f546 : 00000001`40000000 00000000`00000000 00000000`0d7b9570 00000000`0e5370c0 : blender!PyInit_aud+0x160c6a 02 00000000`0022f180 00000001`406a2541 : 00000000`03944250 00000000`03944250 00000000`0d7b9570 00000000`03944250 : blender!PyInit_aud+0x168ef6 03 00000000`0022f210 00000001`406a2a32 : 00000000`03944250 00000000`0e5370c0 00000000`00000001 00000000`0022f3c8 : blender!turbulence1+0x1aa931 04 00000000`0022f2c0 00000001`406e614e : 00000000`0e5370c0 00000000`0df30d80 00000000`0e5370d8 00000000`0df30d80 : blender!turbulence1+0x1aae22 05 00000000`0022f4c0 00000001`406665a6 : 00000000`0de33150 00000001`412c3398 00000000`0cc06b40 00000000`0cc3e6a0 : blender!turbulence1+0x1ee53e 06 00000000`0022f530 00000001`406122f8 : 00000000`0cc44798 00000000`00000000 00000000`0389b108 00000000`0cd855c8 : blender!turbulence1+0x16e996 07 00000000`0022f5e0 00000001`40068bdb : 00000000`0357f128 449dc800`44d26000 00000000`0389b108 00000000`0357f128 : blender!turbulence1+0x11a6e8 08 00000000`0022fc20 00000001`40008c47 : 00000000`0357f128 00000000`00000008 00000000`0cd856d0 00000000`03a98748 : blender+0x68bdb 09 00000000`0022fca0 00000001`40009a99 : 00000000`0d374b38 00000000`00000008 00000000`00000000 00000000`0357f128 : blender+0x8c47 0a 00000000`0022fcf0 00000001`40009f98 : 00000000`0af07438 00000000`00000000 00000000`0356f000 00000000`039e03f8 : blender+0x9a99 0b 00000000`0022fd60 00000001`4000a9ed : 00000000`0357f128 00000000`0d374b38 00000000`0cd856d0 00000000`00000000 : blender+0x9f98 0c 00000000`0022fdd0 00000001`400043b0 : 00000000`0357f128 00000000`0ae5aa98 00000000`00000000 00000000`00000000 : blender+0xa9ed 0d 00000000`0022fea0 00000001`40001233 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : blender+0x43b0 0e 00000000`0022fed0 00000001`40a8ecd3 : 00000000`00000001 00000000`02465bb0 00000000`00000000 00000000`00000000 : blender+0x1233 0f 00000000`0022ff20 00000000`76f9652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : blender!PyInit_aud+0x158683 10 00000000`0022ff60 00000000`7768c521 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd 11 00000000`0022ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21 Creating c:\Debug\20111012_095255_Crash_Mode\FULLDUMP_SecondChance_eh_CPlusPlusEH_blender.exe__1588_2011-10-12_09-54-40-693_13d0.dmp - mini user dump Dump successfully written (13d0.17b0): Access violation - code c0000005 (first chance) FirstChance_av_AccessViolation Current time: Debug session time: Wed Oct 12 09:54:44.223 2011 (UTC - 5:00) System Uptime: 0 days 2:46:06.549 Process Uptime: 0 days 0:08:25.097 Kernel time: 0 days 0:00:04.539 User time: 0 days 0:01:47.500 Call stack below --- # Child-SP RetAddr : Args to Child : Call Site 00 00000000`1df2fcc0 00000001`40949089 : 00000000`03944250 00000000`00000001 00000000`00000800 00000000`00000000 : blender!PyInit_aud+0x12292 *** WARNING: Unable to verify checksum for C:\Users\main\Desktop\blender259\pthreadVC2.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Users\main\Desktop\blender259\pthreadVC2.dll - 01 00000000`1df2fe60 00000000`007e4d75 : 00000000`00000000 00000000`007e950e 00000000`00000000 00000000`034e9460 : blender!PyInit_aud+0x12a39 02 00000000`1df2fe90 00000000`007e7fdb : 00000000`034e9460 00000000`00000000 00000000`00000000 00000000`00000000 : pthreadVC2!sched_get_priority_max+0x3aa0 03 00000000`1df2ff00 00000000`007e808f : 00000000`008068c0 00000000`034e9460 00000000`00000000 00000000`00000000 : pthreadVC2!sched_get_priority_max+0x6d06 04 00000000`1df2ff30 00000000`76f9652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : pthreadVC2!sched_get_priority_max+0x6dba 05 00000000`1df2ff60 00000000`7768c521 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd 06 00000000`1df2ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21 Creating c:\Debug\20111012_095255_Crash_Mode\MINIDUMP_FirstChance_av_AccessViolation_blender.exe__1588_2011-10-12_09-54-44-231_13d0.dmp - mini user dump Dump successfully written (13d0.17b0): Access violation - code c0000005 (!!! second chance !!!) SecondChance_av_AccessViolation Current time: Debug session time: Wed Oct 12 09:54:44.372 2011 (UTC - 5:00) System Uptime: 0 days 2:46:06.698 Process Uptime: 0 days 0:08:25.246 Kernel time: 0 days 0:00:04.539 User time: 0 days 0:01:47.500 Call stack below --- # Child-SP RetAddr : Args to Child : Call Site 00 00000000`1df2fcc0 00000001`40949089 : 00000000`03944250 00000000`00000001 00000000`00000800 00000000`00000000 : blender!PyInit_aud+0x12292 01 00000000`1df2fe60 00000000`007e4d75 : 00000000`00000000 00000000`007e950e 00000000`00000000 00000000`034e9460 : blender!PyInit_aud+0x12a39 02 00000000`1df2fe90 00000000`007e7fdb : 00000000`034e9460 00000000`00000000 00000000`00000000 00000000`00000000 : pthreadVC2!sched_get_priority_max+0x3aa0 03 00000000`1df2ff00 00000000`007e808f : 00000000`008068c0 00000000`034e9460 00000000`00000000 00000000`00000000 : pthreadVC2!sched_get_priority_max+0x6d06 04 00000000`1df2ff30 00000000`76f9652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : pthreadVC2!sched_get_priority_max+0x6dba 05 00000000`1df2ff60 00000000`7768c521 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd 06 00000000`1df2ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21 Creating c:\Debug\20111012_095255_Crash_Mode\FULLDUMP_SecondChance_av_AccessViolation_blender.exe__1588_2011-10-12_09-54-44-379_13d0.dmp - mini user dump Dump successfully written FirstChance_epr_Process_Shut_Down Current time: Debug session time: Wed Oct 12 09:54:45.775 2011 (UTC - 5:00) System Uptime: 0 days 2:46:08.101 Process Uptime: 0 days 0:08:26.649 Kernel time: 0 days 0:00:04.539 User time: 0 days 0:01:47.500 Call stacks below --- . 13 Id: 13d0.14fc Suspend: 0 Teb: 000007ff`fff00000 Unfrozen # Child-SP RetAddr : Args to Child : Call Site 00 00000000`13e6fe58 000007fe`fdce10dc : 00000000`1b9c0960 00000000`691dceed 00000000`00000002 00000000`00000000 : ntdll!NtWaitForSingleObject+0xa *** WARNING: Unable to verify checksum for C:\Windows\system32\atio6axx.dll *** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Windows\system32\atio6axx.dll - 01 00000000`13e6fe60 00000000`6939e90d : 00000000`068d9a08 00000000`00000000 00000000`00000000 00000000`000005c8 : KERNELBASE!WaitForSingleObjectEx+0x9c 02 00000000`13e6ff00 00000000`6939e8bc : 00000000`068d9a08 00000000`00000000 00000000`00000000 00000000`00000000 : atio6axx!atiPS+0x1be23d 03 00000000`13e6ff30 00000000`76f9652d : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : atio6axx!atiPS+0x1be1ec 04 00000000`13e6ff60 00000000`7768c521 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : kernel32!BaseThreadInitThunk+0xd 05 00000000`13e6ff90 00000000`00000000 : 00000000`00000000 00000000`00000000 00000000`00000000 00000000`00000000 : ntdll!RtlUserThreadStart+0x21 Creating c:\Debug\20111012_095255_Crash_Mode\FULLDUMP_FirstChance_epr_Process_Shut_Down_blender.exe__1588_2011-10-12_09-54-45-883_13d0.dmp - mini user dump Dump successfully written Thread Usage Information: User Mode Time Thread Time 13:14fc 0 days 0:00:03.369 quit: