Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: "C:\Users\Stefan\Downloads\EXAMPLE.EXE" Symbol search path is: srv*C:\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: ModLoad: 00000000`00400000 00000000`00403000 image00000000`00400000 ModLoad: 00000000`775b0000 00000000`7775b000 ntdll.dll ModLoad: 00000000`77790000 00000000`77910000 ntdll32.dll ModLoad: 00000000`001b0000 00000000`0021e000 C:\Windows\System32\verifier.dll AVRF: EXAMPLE.EXE: pid 0xBB4: flags 0x80000000: application verifier enabled ModLoad: 00000000`75040000 00000000`7507f000 C:\Windows\System32\wow64.dll ModLoad: 00000000`74fe0000 00000000`7503c000 C:\Windows\System32\wow64win.dll ModLoad: 00000000`74fd0000 00000000`74fd8000 C:\Windows\System32\wow64cpu.dll (bb4.564): Break instruction exception - code 80000003 (first chance) ntdll!LdrpDoDebuggerBreak+0x30: 00000000`77657800 cc int 3 0:000> g ModLoad: 00000000`77490000 00000000`775af000 WOW64_IMAGE_SECTION ModLoad: 00000000`76650000 00000000`76760000 WOW64_IMAGE_SECTION ModLoad: 00000000`77490000 00000000`775af000 NOT_AN_IMAGE ModLoad: 00000000`77390000 00000000`7748a000 NOT_AN_IMAGE ModLoad: 00000000`6aea0000 00000000`6af00000 C:\Windows\SysWOW64\verifier.dll AVRF: EXAMPLE.EXE: pid 0xBB4: flags 0x80000000: application verifier enabled ModLoad: 00000000`10000000 00000000`1000b000 C:\Windows\SysWOW64\VrfKnthk.Dll VrfKnthk!DllMain(0x10000000, 0x00000004 = DLL_PROCESS_VERIFIER, 0x0018FAD8) VrfKnthk!DllMain(0x10000000, 0x00000001 = DLL_PROCESS_ATTACH, 0x0018FAD8) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 ModLoad: 00000000`76650000 00000000`76760000 C:\Windows\SysWOW64\kernel32.dll ModLoad: 00000000`753f0000 00000000`75437000 C:\Windows\SysWOW64\KERNELBASE.dll VrfKnthk!DllLoad: module 'KERNELBASE.dll' loaded at 0x753F0000, size 0x00047000 VrfKnthk!DllLoad: module 'kernel32.dll' loaded at 0x76650000, size 0x00110000 VrfKnthk!DllMain(0x10000000, 0x00000001 = DLL_PROCESS_ATTACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 ModLoad: 00000000`761f0000 00000000`76291000 C:\Windows\SysWOW64\ADVAPI32.DLL ModLoad: 00000000`75340000 00000000`753ec000 C:\Windows\SysWOW64\msvcrt.dll VrfKnthk!DllLoad: module 'msvcrt.dll' loaded at 0x75340000, size 0x000AC000 ModLoad: 00000000`76540000 00000000`76559000 C:\Windows\SysWOW64\sechost.dll ModLoad: 00000000`76410000 00000000`76500000 C:\Windows\SysWOW64\RPCRT4.dll ModLoad: 00000000`750a0000 00000000`75100000 C:\Windows\SysWOW64\SspiCli.dll ModLoad: 00000000`75090000 00000000`7509c000 C:\Windows\SysWOW64\CRYPTBASE.dll VrfKnthk!DllLoad: module 'CRYPTBASE.dll' loaded at 0x75090000, size 0x0000C000 VrfKnthk!DllLoad: module 'SspiCli.dll' loaded at 0x750A0000, size 0x00060000 VrfKnthk!DllLoad: module 'RPCRT4.dll' loaded at 0x76410000, size 0x000F0000 VrfKnthk!DllLoad: module 'sechost.dll' loaded at 0x76540000, size 0x00019000 VrfKnthk!DllLoad: module 'ADVAPI32.DLL' loaded at 0x761F0000, size 0x000A1000 ModLoad: 00000000`76cb0000 00000000`76e0d000 C:\Windows\SysWOW64\ole32.dll ModLoad: 00000000`77140000 00000000`771d0000 C:\Windows\SysWOW64\GDI32.dll ModLoad: 00000000`760c0000 00000000`761c0000 C:\Windows\SysWOW64\USER32.dll VrfKnthk!DllLoad: module 'USER32.dll' loaded at 0x760C0000, size 0x00100000 ModLoad: 00000000`760a0000 00000000`760aa000 C:\Windows\SysWOW64\LPK.dll ModLoad: 00000000`762e0000 00000000`7637d000 C:\Windows\SysWOW64\USP10.dll VrfKnthk!DllLoad: module 'USP10.dll' loaded at 0x762E0000, size 0x0009D000 VrfKnthk!DllLoad: module 'LPK.dll' loaded at 0x760A0000, size 0x0000A000 VrfKnthk!DllLoad: module 'GDI32.dll' loaded at 0x77140000, size 0x00090000 VrfKnthk!DllLoad: module 'ole32.dll' loaded at 0x76CB0000, size 0x0015D000 ModLoad: 00000000`75440000 00000000`7608c000 C:\Windows\SysWOW64\SHELL32.dll ModLoad: 00000000`76c50000 00000000`76ca7000 C:\Windows\SysWOW64\SHLWAPI.dll VrfKnthk!DllLoad: module 'SHLWAPI.dll' loaded at 0x76C50000, size 0x00057000 VrfKnthk!DllLoad: module 'SHELL32.dll' loaded at 0x75440000, size 0x00C4C000 VrfKnthk!DllLoad: module 'EXAMPLE.EXE' loaded at 0x00400000, size 0x00003000 (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. ntdll32!LdrpDoDebuggerBreak+0x2c: 778217a4 cc int 3 0:000:x86> g LoadLibraryW(C:\Windows\System32\IMM32.DLL) LoadLibraryExW(C:\Windows\System32\IMM32.DLL, 0x00000000, 0x00000000) ModLoad: 772a0000 77300000 C:\Windows\SysWOW64\IMM32.DLL ModLoad: 771d0000 7729d000 C:\Windows\SysWOW64\MSCTF.dll VrfKnthk!DllLoad: module 'MSCTF.dll' loaded at 0x771D0000, size 0x000CD000 VrfKnthk!DllLoad: module 'IMM32.DLL' loaded at 0x772A0000, size 0x00060000 LoadLibraryExW(C:\Windows\System32\AppInit.Dll, 0x00000000, 0x00000000) ModLoad: 01d50000 01d56000 C:\Windows\SysWOW64\AppInit.Dll VrfKnthk!DllLoad: module 'AppInit.Dll' loaded at 0x01D50000, size 0x00006000 VrfKnthk!DllUnload: module 'AppInit.Dll' unloaded from 0x01D50000, size 0x00006000 LoadLibraryA(gdi32.dll) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 7666499F : LoadLibraryA 762E5604 : gdi32.dll 762F6260 : USP10.dll+0x00016260 762F65C6 : USP10.dll+0x000165C6 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 7666499F : LoadLibraryA 762E5604 : gdi32.dll 762F6260 : USP10.dll+0x00016260 762F65C6 : USP10.dll+0x000165C6 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g LoadLibraryExA(gdi32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 762E5604 : gdi32.dll 766649D0 : kernel32.dll+0x000149D0 10002D50 : VrfKnthk.Dll+0x00002D50 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 762E5604 : gdi32.dll 766649D0 : kernel32.dll+0x000149D0 10002D50 : VrfKnthk.Dll+0x00002D50 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g LoadLibraryExA(CRYPTBASE.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 764B3D40 : CRYPTBASE.dll 76430BF3 : RPCRT4.dll+0x00020BF3 76430CA7 : RPCRT4.dll+0x00020CA7 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 764B3D40 : CRYPTBASE.dll 76430BF3 : RPCRT4.dll+0x00020BF3 76430CA7 : RPCRT4.dll+0x00020CA7 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g ShellExecuteA(0x00000000, (null), .., (null), (null), 0x00000001) =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called ShellExecute*() without providing an absolute local pathname for the file to execute. 75688A28 : ShellExecuteA 0040201C : .. 00401024 : EXAMPLE.EXE+0x00001024 777BA242 : ntdll.dll+0x0002A242 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g LoadLibraryExA(SHELL32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 76C9F3F0 : SHELL32.dll 76C64F51 : SHLWAPI.dll+0x00014F51 76C5FFAF : SHLWAPI.dll+0x0000FFAF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 76C9F3F0 : SHELL32.dll 76C64F51 : SHLWAPI.dll+0x00014F51 76C5FFAF : SHLWAPI.dll+0x0000FFAF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g LoadLibraryExA(SHELL32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 76C9F3F0 : SHELL32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 76C64F51 : SHLWAPI.dll+0x00014F51 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 76C9F3F0 : SHELL32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 76C64F51 : SHLWAPI.dll+0x00014F51 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g VrfKnthk!DllMain(0x10000000, 0x00000002 = DLL_THREAD_ATTACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 LoadLibraryExA(ole32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 76C9F450 : ole32.dll 76C64F51 : SHLWAPI.dll+0x00014F51 76C5FEE7 : SHLWAPI.dll+0x0000FEE7 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 76C9F450 : ole32.dll 76C64F51 : SHLWAPI.dll+0x00014F51 76C5FEE7 : SHLWAPI.dll+0x0000FEE7 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ole32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 76C9F450 : ole32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 76C64F51 : SHLWAPI.dll+0x00014F51 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 76C9F450 : ole32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 76C64F51 : SHLWAPI.dll+0x00014F51 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ole32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 757FDE70 : ole32.dll 754C38F0 : SHELL32.dll+0x000838F0 754C38DF : SHELL32.dll+0x000838DF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 757FDE70 : ole32.dll 754C38F0 : SHELL32.dll+0x000838F0 754C38DF : SHELL32.dll+0x000838DF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(PROPSYS.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 757FE040 : PROPSYS.dll 754C38F0 : SHELL32.dll+0x000838F0 7548FFAF : SHELL32.dll+0x0004FFAF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 757FE040 : PROPSYS.dll 754C38F0 : SHELL32.dll+0x000838F0 7548FFAF : SHELL32.dll+0x0004FFAF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g ModLoad: 01f70000 01f7e000 C:\Users\Stefan\Downloads\PROPSYS.dll VrfKnthk!DllLoad: module 'PROPSYS.dll' loaded at 0x01F70000, size 0x0000E000 LoadLibraryExA(API-MS-Win-Security-LSALookup-L1-1-0.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 7625F2A0 : API-MS-Win-Security-LSALookup-L1-1-0.dll 762046AE : ADVAPI32.DLL+0x000146AE 76204810 : ADVAPI32.DLL+0x00014810 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 7625F2A0 : API-MS-Win-Security-LSALookup-L1-1-0.dll 762046AE : ADVAPI32.DLL+0x000146AE 76204810 : ADVAPI32.DLL+0x00014810 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(API-MS-Win-Security-LSALookup-L1-1-0.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 7625F2A0 : API-MS-Win-Security-LSALookup-L1-1-0.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 762046AE : ADVAPI32.DLL+0x000146AE =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 7625F2A0 : API-MS-Win-Security-LSALookup-L1-1-0.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 762046AE : ADVAPI32.DLL+0x000146AE =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExW(rpcrt4.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 7642E068 : rpcrt4.dll 7642F734 : RPCRT4.dll+0x0001F734 76461610 : RPCRT4.dll+0x00051610 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 7642E068 : rpcrt4.dll 7642F734 : RPCRT4.dll+0x0001F734 76461610 : RPCRT4.dll+0x00051610 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExW(verifier.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 76474BF0 : verifier.dll 76473FF1 : RPCRT4.dll+0x00063FF1 7642F9C9 : RPCRT4.dll+0x0001F9C9 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 76474BF0 : verifier.dll 76473FF1 : RPCRT4.dll+0x00063FF1 7642F9C9 : RPCRT4.dll+0x0001F9C9 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g ModLoad: 00000000`6ccb0000 00000000`6cda5000 C:\Windows\SysWOW64\propsys.DLL ModLoad: 00000000`765c0000 00000000`7664f000 C:\Windows\SysWOW64\OLEAUT32.dll VrfKnthk!DllLoad: module 'OLEAUT32.dll' loaded at 0x765C0000, size 0x0008F000 VrfKnthk!DllLoad: module 'propsys.DLL' loaded at 0x6CCB0000, size 0x000F5000 LoadLibraryExA(ADVAPI32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 6CD25E90 : ADVAPI32.dll 6CCC4411 : propsys.DLL+0x00014411 6CCB6235 : propsys.DLL+0x00006235 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 6CD25E90 : ADVAPI32.dll 6CCC4411 : propsys.DLL+0x00014411 6CCB6235 : propsys.DLL+0x00006235 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ADVAPI32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 6CD25E90 : ADVAPI32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 6CCC4411 : propsys.DLL+0x00014411 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 6CD25E90 : ADVAPI32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 6CCC4411 : propsys.DLL+0x00014411 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExW(propsys.dll, 0x00000000, 0x00000022) LoadLibraryExW(propsys.dll, 0x00000000, 0x00000022) LoadLibraryW(comctl32.dll) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648F3 : LoadLibraryW 754B2310 : comctl32.dll 754B2350 : SHELL32.dll+0x00072350 754B22F6 : SHELL32.dll+0x000722F6 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648F3 : LoadLibraryW 754B2310 : comctl32.dll 754B2350 : SHELL32.dll+0x00072350 754B22F6 : SHELL32.dll+0x000722F6 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExW(comctl32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 754B2310 : comctl32.dll 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 754B2310 : comctl32.dll 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g ModLoad: 74710000 748ae000 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.23403_none_2b180b30457f196c\comctl32.dll VrfKnthk!DllLoad: module 'comctl32.dll' loaded at 0x74710000, size 0x0019E000 LoadLibraryW(comctl32.dll) LoadLibraryExW(comctl32.dll, 0x00000000, 0x00000000) LoadLibraryExA(OLEAUT32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 757FDE80 : OLEAUT32.dll 754C38F0 : SHELL32.dll+0x000838F0 75491C93 : SHELL32.dll+0x00051C93 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 757FDE80 : OLEAUT32.dll 754C38F0 : SHELL32.dll+0x000838F0 75491C93 : SHELL32.dll+0x00051C93 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ADVAPI32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 757FDDC0 : ADVAPI32.dll 754C38F0 : SHELL32.dll+0x000838F0 7549134D : SHELL32.dll+0x0005134D =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 757FDDC0 : ADVAPI32.dll 754C38F0 : SHELL32.dll+0x000838F0 7549134D : SHELL32.dll+0x0005134D =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ADVAPI32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 76C9F440 : ADVAPI32.dll 76C64F51 : SHLWAPI.dll+0x00014F51 76C65365 : SHLWAPI.dll+0x00015365 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 76C9F440 : ADVAPI32.dll 76C64F51 : SHLWAPI.dll+0x00014F51 76C65365 : SHLWAPI.dll+0x00015365 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ADVAPI32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 76C9F440 : ADVAPI32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 76C64F51 : SHLWAPI.dll+0x00014F51 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 76C9F440 : ADVAPI32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 76C64F51 : SHLWAPI.dll+0x00014F51 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(apphelp.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 757FE010 : apphelp.dll 754C38F0 : SHELL32.dll+0x000838F0 754630E4 : SHELL32.dll+0x000230E4 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 757FE010 : apphelp.dll 754C38F0 : SHELL32.dll+0x000838F0 754630E4 : SHELL32.dll+0x000230E4 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g ModLoad: 01fd0000 01fdc000 C:\Users\Stefan\Downloads\apphelp.dll VrfKnthk!DllLoad: module 'apphelp.dll' loaded at 0x01FD0000, size 0x0000C000 ModLoad: 74ac0000 74b0c000 C:\Windows\SysWOW64\apphelp.DLL VrfKnthk!DllLoad: module 'apphelp.DLL' loaded at 0x74AC0000, size 0x0004C000 VrfKnthk!DllMain(0x10000000, 0x00000002 = DLL_THREAD_ATTACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 LoadLibraryExA(CLBCatQ.DLL, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 76DE5C80 : CLBCatQ.DLL 76CF145D : ole32.dll+0x0004145D 76CF5FBD : ole32.dll+0x00045FBD =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 76DE5C80 : CLBCatQ.DLL 76CF145D : ole32.dll+0x0004145D 76CF5FBD : ole32.dll+0x00045FBD =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g ModLoad: 75100000 75183000 C:\Windows\SysWOW64\CLBCatQ.DLL VrfKnthk!DllLoad: module 'CLBCatQ.DLL' loaded at 0x75100000, size 0x00083000 VrfKnthk!DllMain(0x10000000, 0x00000002 = DLL_THREAD_ATTACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 LoadLibraryExW(C:\Windows\SysWOW64\ieframe.dll, 0x00000000, 0x00002008) ModLoad: 00000000`6f7a0000 00000000`704d0000 C:\Windows\SysWOW64\ieframe.dll ModLoad: 00000000`76500000 00000000`76505000 C:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-advapi32-l1-1-0.dll' loaded at 0x76500000, size 0x00005000 ModLoad: 00000000`762b0000 00000000`762b4000 C:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-shlwapi-l1-1-0.dll' loaded at 0x762B0000, size 0x00004000 ModLoad: 00000000`76530000 00000000`76534000 C:\Windows\SysWOW64\api-ms-win-downlevel-user32-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-user32-l1-1-0.dll' loaded at 0x76530000, size 0x00004000 ModLoad: 00000000`748b0000 00000000`748b4000 C:\Windows\SysWOW64\api-ms-win-downlevel-shell32-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-shell32-l1-1-0.dll' loaded at 0x748B0000, size 0x00004000 ModLoad: 00000000`762a0000 00000000`762a4000 C:\Windows\SysWOW64\api-ms-win-downlevel-version-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-version-l1-1-0.dll' loaded at 0x762A0000, size 0x00004000 ModLoad: 00000000`03980000 00000000`03989000 C:\Users\Stefan\Downloads\version.DLL VrfKnthk!DllLoad: module 'version.DLL' loaded at 0x03980000, size 0x00009000 ModLoad: 00000000`74fc0000 00000000`74fc9000 C:\Windows\SysWOW64\version.DLL VrfKnthk!DllLoad: module 'version.DLL' loaded at 0x74FC0000, size 0x00009000 ModLoad: 00000000`75330000 00000000`75333000 C:\Windows\SysWOW64\api-ms-win-downlevel-normaliz-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-normaliz-l1-1-0.dll' loaded at 0x75330000, size 0x00003000 ModLoad: 00000000`76090000 00000000`76093000 C:\Windows\SysWOW64\normaliz.DLL VrfKnthk!DllLoad: module 'normaliz.DLL' loaded at 0x76090000, size 0x00003000 ModLoad: 00000000`76760000 00000000`76994000 C:\Windows\SysWOW64\iertutil.dll VrfKnthk!DllLoad: module 'iertutil.dll' loaded at 0x76760000, size 0x00234000 VrfKnthk!DllLoad: module 'ieframe.dll' loaded at 0x6F7A0000, size 0x00D30000 LoadLibraryW(kernel32.dll) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648F3 : LoadLibraryW 6F823494 : kernel32.dll 6F824723 : ieframe.dll+0x00084723 6F8255AF : ieframe.dll+0x000855AF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648F3 : LoadLibraryW 6F823494 : kernel32.dll 6F824723 : ieframe.dll+0x00084723 6F8255AF : ieframe.dll+0x000855AF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExW(kernel32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 6F823494 : kernel32.dll 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 6F823494 : kernel32.dll 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryW(kernel32.dll) LoadLibraryExW(kernel32.dll, 0x00000000, 0x00000000) LoadLibraryW(kernel32.dll) LoadLibraryExW(kernel32.dll, 0x00000000, 0x00000000) LoadLibraryW(kernel32.dll) LoadLibraryExW(kernel32.dll, 0x00000000, 0x00000000) LoadLibraryW(kernel32.dll) LoadLibraryExW(kernel32.dll, 0x00000000, 0x00000000) LoadLibraryW(kernel32.dll) LoadLibraryExW(kernel32.dll, 0x00000000, 0x00000000) LoadLibraryExW(comctl32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 76664925 : LoadLibraryExW 6F82382C : comctl32.dll 6F8257CB : ieframe.dll+0x000857CB 6F82579D : ieframe.dll+0x0008579D =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 76664925 : LoadLibraryExW 6F82382C : comctl32.dll 6F8257CB : ieframe.dll+0x000857CB 6F82579D : ieframe.dll+0x0008579D =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExW(comctl32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 6F82382C : comctl32.dll 1000316E : VrfKnthk.Dll+0x0000316E 6F8257CB : ieframe.dll+0x000857CB =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 6F82382C : comctl32.dll 1000316E : VrfKnthk.Dll+0x0000316E 6F8257CB : ieframe.dll+0x000857CB =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g VrfKnthk!DllMain(0x10000000, 0x00000002 = DLL_THREAD_ATTACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 LoadLibraryExA(SETUPAPI.dll, 0x00000000, 0x00000000) LoadLibraryExW(C:\Windows\System32\propsys.dll, 0x00000000, 0x00002008) LoadLibraryW(ntmarta.dll) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 757FE000 : SETUPAPI.dll 754C38F0 : SHELL32.dll+0x000838F0 754908E7 : SHELL32.dll+0x000508E7 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.1364): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:003:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 757FE000 : SETUPAPI.dll 754C38F0 : SHELL32.dll+0x000838F0 754908E7 : SHELL32.dll+0x000508E7 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.1364): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:003:x86> g ModLoad: 76f60000 770fd000 C:\Windows\SysWOW64\SETUPAPI.dll ModLoad: 761c0000 761e7000 C:\Windows\SysWOW64\CFGMGR32.dll VrfKnthk!DllLoad: module 'CFGMGR32.dll' loaded at 0x761C0000, size 0x00027000 ModLoad: 762c0000 762d2000 C:\Windows\SysWOW64\DEVOBJ.dll VrfKnthk!DllLoad: module 'DEVOBJ.dll' loaded at 0x762C0000, size 0x00012000 VrfKnthk!DllLoad: module 'SETUPAPI.dll' loaded at 0x76F60000, size 0x0019D000 =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648F3 : LoadLibraryW 0371DE60 : ntmarta.dll 762027F4 : ADVAPI32.DLL+0x000127F4 762029B8 : ADVAPI32.DLL+0x000129B8 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648F3 : LoadLibraryW 0371DE60 : ntmarta.dll 762027F4 : ADVAPI32.DLL+0x000127F4 762029B8 : ADVAPI32.DLL+0x000129B8 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExW(API-MS-Win-Core-LocalRegistry-L1-1-0.dll, 0x00000000, 0x00000008) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 76664925 : LoadLibraryExW 76F711A0 : API-MS-Win-Core-LocalRegistry-L1-1-0.dll 76F71188 : SETUPAPI.dll+0x00011188 76F7110C : SETUPAPI.dll+0x0001110C =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.1364): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:003:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 76664925 : LoadLibraryExW 76F711A0 : API-MS-Win-Core-LocalRegistry-L1-1-0.dll 76F71188 : SETUPAPI.dll+0x00011188 76F7110C : SETUPAPI.dll+0x0001110C =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.1364): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:003:x86> g LoadLibraryExW(API-MS-Win-Core-LocalRegistry-L1-1-0.dll, 0x00000000, 0x00000008) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 76F711A0 : API-MS-Win-Core-LocalRegistry-L1-1-0.dll 1000316E : VrfKnthk.Dll+0x0000316E 76F71188 : SETUPAPI.dll+0x00011188 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.1364): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:003:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 76F711A0 : API-MS-Win-Core-LocalRegistry-L1-1-0.dll 1000316E : VrfKnthk.Dll+0x0000316E 76F71188 : SETUPAPI.dll+0x00011188 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.1364): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:003:x86> g LoadLibraryExW(ntmarta.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 0371DE60 : ntmarta.dll 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 0371DE60 : ntmarta.dll 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g ModLoad: 05a30000 05a3a000 C:\Users\Stefan\Downloads\ntmarta.dll VrfKnthk!DllLoad: module 'ntmarta.dll' loaded at 0x05A30000, size 0x0000A000 ModLoad: 6ad60000 6ad81000 C:\Windows\SysWOW64\ntmarta.DLL ModLoad: 76c00000 76c45000 C:\Windows\SysWOW64\WLDAP32.dll VrfKnthk!DllLoad: module 'WLDAP32.dll' loaded at 0x76C00000, size 0x00045000 VrfKnthk!DllLoad: module 'ntmarta.DLL' loaded at 0x6AD60000, size 0x00021000 VrfKnthk!DllMain(0x10000000, 0x00000002 = DLL_THREAD_ATTACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 LoadLibraryExA(API-MS-Win-Security-SDDL-L1-1-0.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 757FDD80 : API-MS-Win-Security-SDDL-L1-1-0.dll 754C38F0 : SHELL32.dll+0x000838F0 754C5A2A : SHELL32.dll+0x00085A2A =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VrfKnthk!DllMain(0x10000000, 0x00000002 = DLL_THREAD_ATTACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 757FDD80 : API-MS-Win-Security-SDDL-L1-1-0.dll 754C38F0 : SHELL32.dll+0x000838F0 754C5A2A : SHELL32.dll+0x00085A2A =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(profapi.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 757FDE50 : profapi.dll 754C38F0 : SHELL32.dll+0x000838F0 754C5802 : SHELL32.dll+0x00085802 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 757FDE50 : profapi.dll 754C38F0 : SHELL32.dll+0x000838F0 754C5802 : SHELL32.dll+0x00085802 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g ModLoad: 76bf0000 76bfb000 C:\Windows\SysWOW64\profapi.dll VrfKnthk!DllLoad: module 'profapi.dll' loaded at 0x76BF0000, size 0x0000B000 LoadLibraryExW(C:\Windows\System32\ExplorerFrame.dll, 0x00000000, 0x00000022) LoadLibraryExW(C:\Windows\System32\ExplorerFrame.dll, 0x00000000, 0x00000022) LoadLibraryExW(C:\Windows\System32\ExplorerFrame.dll, 0x00000000, 0x00000022) LoadLibraryExW(C:\Windows\System32\ExplorerFrame.dll, 0x00000000, 0x00000022) ModLoad: 6c500000 6c670000 EXPLORERFRAME.dll LoadLibraryExW(C:\Windows\System32\explorerframe.dll, 0x00000000, 0x00002008) ModLoad: 6c500000 6c670000 C:\Windows\SysWOW64\explorerframe.dll ModLoad: 6c4b0000 6c4df000 C:\Windows\SysWOW64\DUser.dll VrfKnthk!DllLoad: module 'DUser.dll' loaded at 0x6C4B0000, size 0x0002F000 ModLoad: 6c100000 6c1b2000 C:\Windows\SysWOW64\DUI70.dll VrfKnthk!DllLoad: module 'DUI70.dll' loaded at 0x6C100000, size 0x000B2000 VrfKnthk!DllLoad: module 'explorerframe.dll' loaded at 0x6C500000, size 0x00170000 LoadLibraryA(ntdll.dll) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 7666499F : LoadLibraryA 6C4C035C : ntdll.dll 6C4C02D8 : DUser.dll+0x000102D8 6C4C0202 : DUser.dll+0x00010202 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 7666499F : LoadLibraryA 6C4C035C : ntdll.dll 6C4C02D8 : DUser.dll+0x000102D8 6C4C0202 : DUser.dll+0x00010202 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ntdll.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 6C4C035C : ntdll.dll 766649D0 : kernel32.dll+0x000149D0 10002D50 : VrfKnthk.Dll+0x00002D50 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 6C4C035C : ntdll.dll 766649D0 : kernel32.dll+0x000149D0 10002D50 : VrfKnthk.Dll+0x00002D50 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ole32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 6C5F2440 : ole32.dll 6C50CF1B : explorerframe.dll+0x0000CF1B 6C50CEFF : explorerframe.dll+0x0000CEFF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 6C5F2440 : ole32.dll 6C50CF1B : explorerframe.dll+0x0000CF1B 6C50CEFF : explorerframe.dll+0x0000CEFF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ole32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 6C5F2440 : ole32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 6C50CF1B : explorerframe.dll+0x0000CF1B =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 6C5F2440 : ole32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 6C50CF1B : explorerframe.dll+0x0000CF1B =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(API-MS-Win-Security-LSALookup-L1-1-0.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 764B3CF0 : API-MS-Win-Security-LSALookup-L1-1-0.dll 76430BF3 : RPCRT4.dll+0x00020BF3 7643771D : RPCRT4.dll+0x0002771D =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 764B3CF0 : API-MS-Win-Security-LSALookup-L1-1-0.dll 76430BF3 : RPCRT4.dll+0x00020BF3 7643771D : RPCRT4.dll+0x0002771D =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ADVAPI32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 76DE5C30 : ADVAPI32.dll 76CF145D : ole32.dll+0x0004145D 76CD84AC : ole32.dll+0x000284AC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 76DE5C30 : ADVAPI32.dll 76CF145D : ole32.dll+0x0004145D 76CD84AC : ole32.dll+0x000284AC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(CRYPTSP.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 76DE5C20 : CRYPTSP.dll 76CF145D : ole32.dll+0x0004145D 76CE9719 : ole32.dll+0x00039719 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 76DE5C20 : CRYPTSP.dll 76CF145D : ole32.dll+0x0004145D 76CE9719 : ole32.dll+0x00039719 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g ModLoad: 05e20000 05e2a000 C:\Users\Stefan\Downloads\CRYPTSP.dll VrfKnthk!DllLoad: module 'CRYPTSP.dll' loaded at 0x05E20000, size 0x0000A000 ModLoad: 74dc0000 74dd7000 C:\Windows\SysWOW64\cryptsp.DLL VrfKnthk!DllLoad: module 'cryptsp.DLL' loaded at 0x74DC0000, size 0x00017000 SearchPathW((null), C:\Windows\System32\rsaenh.dll, (null), 0x00000104, 0x055EEBE4, 0x055EEBC8) LoadLibraryExA(C:\Windows\System32\rsaenh.dll, 0x00000000, 0x00000000) ModLoad: 74d80000 74dbb000 C:\Windows\SysWOW64\rsaenh.dll VrfKnthk!DllLoad: module 'rsaenh.dll' loaded at 0x74D80000, size 0x0003B000 LoadLibraryExA(ADVAPI32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 74DB3CD0 : ADVAPI32.dll 74D858D0 : rsaenh.dll+0x000058D0 74D858C4 : rsaenh.dll+0x000058C4 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 74DB3CD0 : ADVAPI32.dll 74D858D0 : rsaenh.dll+0x000058D0 74D858C4 : rsaenh.dll+0x000058C4 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ADVAPI32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 74DB3CD0 : ADVAPI32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 74D858D0 : rsaenh.dll+0x000058D0 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 74DB3CD0 : ADVAPI32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 74D858D0 : rsaenh.dll+0x000058D0 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(CRYPTBASE.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 74DB3CC0 : CRYPTBASE.dll 74D858D0 : rsaenh.dll+0x000058D0 74D85771 : rsaenh.dll+0x00005771 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 74DB3CC0 : CRYPTBASE.dll 74D858D0 : rsaenh.dll+0x000058D0 74D85771 : rsaenh.dll+0x00005771 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(CRYPTBASE.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 74DB3CC0 : CRYPTBASE.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 74D858D0 : rsaenh.dll+0x000058D0 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 74DB3CC0 : CRYPTBASE.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 74D858D0 : rsaenh.dll+0x000058D0 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExW(RpcRtRemote.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 055EEC0C : RpcRtRemote.dll 76437805 : RPCRT4.dll+0x00027805 7644A84D : RPCRT4.dll+0x0003A84D =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 055EEC0C : RpcRtRemote.dll 76437805 : RPCRT4.dll+0x00027805 7644A84D : RPCRT4.dll+0x0003A84D =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g ModLoad: 05e30000 05e39000 C:\Users\Stefan\Downloads\RpcRtRemote.dll VrfKnthk!DllLoad: module 'RpcRtRemote.dll' loaded at 0x05E30000, size 0x00009000 ModLoad: 74d70000 74d7e000 C:\Windows\SysWOW64\RpcRtRemote.DLL VrfKnthk!DllLoad: module 'RpcRtRemote.DLL' loaded at 0x74D70000, size 0x0000E000 VrfKnthk!DllMain(0x10000000, 0x00000002 = DLL_THREAD_ATTACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 LoadLibraryExW(C:\Windows\SysWOW64\oleaut32.dll, 0x00000000, 0x00002008) LoadLibraryW(SXS.DLL) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648F3 : LoadLibraryW 765D3F2C : SXS.DLL 765D3F50 : OLEAUT32.dll+0x00013F50 765D3EFF : OLEAUT32.dll+0x00013EFF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648F3 : LoadLibraryW 765D3F2C : SXS.DLL 765D3F50 : OLEAUT32.dll+0x00013F50 765D3EFF : OLEAUT32.dll+0x00013EFF =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExW(SXS.DLL, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 765D3F2C : SXS.DLL 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 765D3F2C : SXS.DLL 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g VrfKnthk!DllMain(0x10000000, 0x00000003 = DLL_THREAD_DETACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 VrfKnthk!DllMain(0x10000000, 0x00000002 = DLL_THREAD_ATTACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 VrfKnthk!DllMain(0x10000000, 0x00000003 = DLL_THREAD_DETACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 ModLoad: 00000000`058f0000 00000000`058f9000 C:\Users\Stefan\Downloads\SXS.DLL VrfKnthk!DllLoad: module 'SXS.DLL' loaded at 0x058F0000, size 0x00009000 ModLoad: 00000000`74140000 00000000`7419f000 C:\Windows\SysWOW64\sxs.DLL VrfKnthk!DllLoad: module 'sxs.DLL' loaded at 0x74140000, size 0x0005F000 LoadLibraryExA(ADVAPI32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 76642490 : ADVAPI32.dll 765D3D80 : OLEAUT32.dll+0x00013D80 765D3CAC : OLEAUT32.dll+0x00013CAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 76642490 : ADVAPI32.dll 765D3D80 : OLEAUT32.dll+0x00013D80 765D3CAC : OLEAUT32.dll+0x00013CAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(ADVAPI32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 76642490 : ADVAPI32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 765D3D80 : OLEAUT32.dll+0x00013D80 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 76642490 : ADVAPI32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 765D3D80 : OLEAUT32.dll+0x00013D80 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(PROPSYS.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 6C5F2480 : PROPSYS.dll 6C50CF1B : explorerframe.dll+0x0000CF1B 6C512360 : explorerframe.dll+0x00012360 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 6C5F2480 : PROPSYS.dll 6C50CF1B : explorerframe.dll+0x0000CF1B 6C512360 : explorerframe.dll+0x00012360 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(PROPSYS.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 6C5F2480 : PROPSYS.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 6C50CF1B : explorerframe.dll+0x0000CF1B =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 6C5F2480 : PROPSYS.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 6C50CF1B : explorerframe.dll+0x0000CF1B =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryA(OLEAUT32) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 7666499F : LoadLibraryA 76CD0E30 : OLEAUT32 76CD1847 : ole32.dll+0x00021847 76444F7C : RPCRT4.dll+0x00034F7C =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 7666499F : LoadLibraryA 76CD0E30 : OLEAUT32 76CD1847 : ole32.dll+0x00021847 76444F7C : RPCRT4.dll+0x00034F7C =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(OLEAUT32, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 76CD0E30 : OLEAUT32 766649D0 : kernel32.dll+0x000149D0 10002D50 : VrfKnthk.Dll+0x00002D50 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 76CD0E30 : OLEAUT32 766649D0 : kernel32.dll+0x000149D0 10002D50 : VrfKnthk.Dll+0x00002D50 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(OLEAUT32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 6C5F2450 : OLEAUT32.dll 6C50CF1B : explorerframe.dll+0x0000CF1B 6C50CF9C : explorerframe.dll+0x0000CF9C =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 6C5F2450 : OLEAUT32.dll 6C50CF1B : explorerframe.dll+0x0000CF1B 6C50CF9C : explorerframe.dll+0x0000CF9C =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExA(OLEAUT32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 6C5F2450 : OLEAUT32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 6C50CF1B : explorerframe.dll+0x0000CF1B =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 6C5F2450 : OLEAUT32.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 6C50CF1B : explorerframe.dll+0x0000CF1B =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.13f0): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:001:x86> g LoadLibraryExW(C:\Windows\SysWOW64\actxprxy.dll, 0x00000000, 0x00002008) ModLoad: 6c9f0000 6ca3e000 C:\Windows\SysWOW64\actxprxy.dll VrfKnthk!DllLoad: module 'actxprxy.dll' loaded at 0x6C9F0000, size 0x0004E000 VrfKnthk!DllUnload: module 'explorerframe.dll' unloaded from 0x6C500000, size 0x00170000 VrfKnthk!DllUnload: module 'DUI70.dll' unloaded from 0x6C100000, size 0x000B2000 VrfKnthk!DllUnload: module 'DUser.dll' unloaded from 0x6C4B0000, size 0x0002F000 VrfKnthk!DllUnload: module 'ieframe.dll' unloaded from 0x6F7A0000, size 0x00D30000 VrfKnthk!DllUnload: module 'iertutil.dll' unloaded from 0x76760000, size 0x00234000 VrfKnthk!DllUnload: module 'api-ms-win-downlevel-normaliz-l1-1-0.dll' unloaded from 0x75330000, size 0x00003000 VrfKnthk!DllUnload: module 'api-ms-win-downlevel-version-l1-1-0.dll' unloaded from 0x762A0000, size 0x00004000 VrfKnthk!DllUnload: module 'api-ms-win-downlevel-shell32-l1-1-0.dll' unloaded from 0x748B0000, size 0x00004000 VrfKnthk!DllUnload: module 'api-ms-win-downlevel-user32-l1-1-0.dll' unloaded from 0x76530000, size 0x00004000 VrfKnthk!DllUnload: module 'api-ms-win-downlevel-shlwapi-l1-1-0.dll' unloaded from 0x762B0000, size 0x00004000 VrfKnthk!DllUnload: module 'api-ms-win-downlevel-advapi32-l1-1-0.dll' unloaded from 0x76500000, size 0x00005000 VrfKnthk!DllUnload: module 'normaliz.DLL' unloaded from 0x76090000, size 0x00003000 VrfKnthk!DllUnload: module 'version.DLL' unloaded from 0x03980000, size 0x00009000 VrfKnthk!DllUnload: module 'version.DLL' unloaded from 0x74FC0000, size 0x00009000 LoadLibraryExA(OLEAUT32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0xBB4: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 76DE5CA0 : OLEAUT32.dll 76CF145D : ole32.dll+0x0004145D 76CEB947 : ole32.dll+0x0003B947 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0xBB4: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 76DE5CA0 : OLEAUT32.dll 76CF145D : ole32.dll+0x0004145D 76CEB947 : ole32.dll+0x0003B947 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (bb4.564): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aea0000!VerifierStopMessage+0x1f8: 6aeaba58 cc int 3 0:000:x86> g VrfKnthk!DllMain(0x10000000, 0x00000000 = DLL_PROCESS_DETACH, 0x00000001) VrfKnthk!DllMain: VerifierImage = 0x036F0FC2 = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 ntdll!NtTerminateProcess+0xa: 00000000`775fbdfa c3 ret 0:000> q