Microsoft (R) Windows Debugger Version 6.11.0001.404 AMD64 Copyright (c) Microsoft Corporation. All rights reserved. CommandLine: "C:\Users\Stefan\Downloads\EXAMPLE.EXE" Symbol search path is: srv*C:\Symbols*http://msdl.microsoft.com/download/symbols Executable search path is: ModLoad: 00000000`00400000 00000000`00403000 image00000000`00400000 ModLoad: 00000000`775b0000 00000000`7775b000 ntdll.dll ModLoad: 00000000`77790000 00000000`77910000 ntdll32.dll ModLoad: 00000000`001b0000 00000000`0021e000 C:\Windows\System32\verifier.dll AVRF: EXAMPLE.EXE: pid 0x580: flags 0x80000000: application verifier enabled ModLoad: 00000000`75040000 00000000`7507f000 C:\Windows\System32\wow64.dll ModLoad: 00000000`74fe0000 00000000`7503c000 C:\Windows\System32\wow64win.dll ModLoad: 00000000`74fd0000 00000000`74fd8000 C:\Windows\System32\wow64cpu.dll (580.1bec): Break instruction exception - code 80000003 (first chance) ntdll!LdrpDoDebuggerBreak+0x30: 00000000`77657800 cc int 3 0:000> g ModLoad: 00000000`77490000 00000000`775af000 WOW64_IMAGE_SECTION ModLoad: 00000000`76650000 00000000`76760000 WOW64_IMAGE_SECTION ModLoad: 00000000`77490000 00000000`775af000 NOT_AN_IMAGE ModLoad: 00000000`77390000 00000000`7748a000 NOT_AN_IMAGE ModLoad: 00000000`6aef0000 00000000`6af50000 C:\Windows\SysWOW64\verifier.dll AVRF: EXAMPLE.EXE: pid 0x580: flags 0x80000000: application verifier enabled ModLoad: 00000000`10000000 00000000`1000b000 C:\Windows\SysWOW64\VrfKnthk.Dll VrfKnthk!DllMain(0x10000000, 0x00000004 = DLL_PROCESS_VERIFIER, 0x0018FAD8) VrfKnthk!DllMain(0x10000000, 0x00000001 = DLL_PROCESS_ATTACH, 0x0018FAD8) VrfKnthk!DllMain: VerifierImage = 0x03511E0A = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 ModLoad: 00000000`76650000 00000000`76760000 C:\Windows\SysWOW64\kernel32.dll ModLoad: 00000000`753f0000 00000000`75437000 C:\Windows\SysWOW64\KERNELBASE.dll VrfKnthk!DllLoad: module 'KERNELBASE.dll' loaded at 0x753F0000, size 0x00047000 VrfKnthk!DllLoad: module 'kernel32.dll' loaded at 0x76650000, size 0x00110000 VrfKnthk!DllMain(0x10000000, 0x00000001 = DLL_PROCESS_ATTACH, 0x00000000) VrfKnthk!DllMain: VerifierImage = 0x03511E0A = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 ModLoad: 00000000`761f0000 00000000`76291000 C:\Windows\SysWOW64\ADVAPI32.DLL ModLoad: 00000000`75340000 00000000`753ec000 C:\Windows\SysWOW64\msvcrt.dll VrfKnthk!DllLoad: module 'msvcrt.dll' loaded at 0x75340000, size 0x000AC000 ModLoad: 00000000`76540000 00000000`76559000 C:\Windows\SysWOW64\sechost.dll ModLoad: 00000000`76410000 00000000`76500000 C:\Windows\SysWOW64\RPCRT4.dll ModLoad: 00000000`750a0000 00000000`75100000 C:\Windows\SysWOW64\SspiCli.dll ModLoad: 00000000`75090000 00000000`7509c000 C:\Windows\SysWOW64\CRYPTBASE.dll VrfKnthk!DllLoad: module 'CRYPTBASE.dll' loaded at 0x75090000, size 0x0000C000 VrfKnthk!DllLoad: module 'SspiCli.dll' loaded at 0x750A0000, size 0x00060000 VrfKnthk!DllLoad: module 'RPCRT4.dll' loaded at 0x76410000, size 0x000F0000 VrfKnthk!DllLoad: module 'sechost.dll' loaded at 0x76540000, size 0x00019000 VrfKnthk!DllLoad: module 'ADVAPI32.DLL' loaded at 0x761F0000, size 0x000A1000 VrfKnthk!DllLoad: module 'EXAMPLE.EXE' loaded at 0x00400000, size 0x00003000 (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. ntdll32!LdrpDoDebuggerBreak+0x2c: 778217a4 cc int 3 0:000:x86> g LoadLibraryA(C:\Program Files (x86)\Common Files\System\WAB32.DLL) LoadLibraryExA(C:\Program Files (x86)\Common Files\System\WAB32.DLL, 0x00000000, 0x00000000) ModLoad: 6ae40000 6aef0000 C:\Program Files (x86)\Common Files\System\WAB32.DLL ModLoad: 002b0000 002b9000 C:\Users\Stefan\Downloads\CRYPTDLG.dll ModLoad: 760c0000 761c0000 C:\Windows\SysWOW64\USER32.dll ModLoad: 77140000 771d0000 C:\Windows\SysWOW64\GDI32.dll ModLoad: 760a0000 760aa000 C:\Windows\SysWOW64\LPK.dll ModLoad: 762e0000 7637d000 C:\Windows\SysWOW64\USP10.dll VrfKnthk!DllLoad: module 'USP10.dll' loaded at 0x762E0000, size 0x0009D000 VrfKnthk!DllLoad: module 'LPK.dll' loaded at 0x760A0000, size 0x0000A000 VrfKnthk!DllLoad: module 'GDI32.dll' loaded at 0x77140000, size 0x00090000 VrfKnthk!DllLoad: module 'USER32.dll' loaded at 0x760C0000, size 0x00100000 VrfKnthk!DllLoad: module 'CRYPTDLG.dll' loaded at 0x002B0000, size 0x00009000 ModLoad: 6b1b0000 6b1b9000 C:\Windows\SysWOW64\cryptdlg.DLL ModLoad: 751d0000 751ff000 C:\Windows\SysWOW64\WINTRUST.dll ModLoad: 75200000 75321000 C:\Windows\SysWOW64\CRYPT32.dll ModLoad: 760b0000 760bc000 C:\Windows\SysWOW64\MSASN1.dll VrfKnthk!DllLoad: module 'MSASN1.dll' loaded at 0x760B0000, size 0x0000C000 VrfKnthk!DllLoad: module 'CRYPT32.dll' loaded at 0x75200000, size 0x00121000 VrfKnthk!DllLoad: module 'WINTRUST.dll' loaded at 0x751D0000, size 0x0002F000 ModLoad: 002c0000 002ca000 C:\Users\Stefan\Downloads\CRYPTUI.dll VrfKnthk!DllLoad: module 'CRYPTUI.dll' loaded at 0x002C0000, size 0x0000A000 ModLoad: 6a860000 6a958000 C:\Windows\SysWOW64\cryptui.DLL VrfKnthk!DllLoad: module 'cryptui.DLL' loaded at 0x6A860000, size 0x000F8000 VrfKnthk!DllLoad: module 'cryptdlg.DLL' loaded at 0x6B1B0000, size 0x00009000 ModLoad: 002e0000 002ec000 C:\Users\Stefan\Downloads\MSOERT2.dll VrfKnthk!DllLoad: module 'MSOERT2.dll' loaded at 0x002E0000, size 0x0000C000 ModLoad: 6b000000 6b01c000 C:\Windows\SysWOW64\msoert2.DLL ModLoad: 76cb0000 76e0d000 C:\Windows\SysWOW64\ole32.dll VrfKnthk!DllLoad: module 'ole32.dll' loaded at 0x76CB0000, size 0x0015D000 ModLoad: 765c0000 7664f000 C:\Windows\SysWOW64\OLEAUT32.dll VrfKnthk!DllLoad: module 'OLEAUT32.dll' loaded at 0x765C0000, size 0x0008F000 ModLoad: 76c50000 76ca7000 C:\Windows\SysWOW64\SHLWAPI.dll VrfKnthk!DllLoad: module 'SHLWAPI.dll' loaded at 0x76C50000, size 0x00057000 VrfKnthk!DllLoad: module 'msoert2.DLL' loaded at 0x6B000000, size 0x0001C000 ModLoad: 75440000 7608c000 C:\Windows\SysWOW64\SHELL32.dll VrfKnthk!DllLoad: module 'SHELL32.dll' loaded at 0x75440000, size 0x00C4C000 ModLoad: 003e0000 003eb000 C:\Users\Stefan\Downloads\UxTheme.dll VrfKnthk!DllLoad: module 'UxTheme.dll' loaded at 0x003E0000, size 0x0000B000 ModLoad: 741c0000 74240000 C:\Windows\SysWOW64\uxtheme.DLL VrfKnthk!DllLoad: module 'uxtheme.DLL' loaded at 0x741C0000, size 0x00080000 ModLoad: 75190000 751bb000 C:\Windows\SysWOW64\imagehlp.dll VrfKnthk!DllLoad: module 'imagehlp.dll' loaded at 0x75190000, size 0x0002B000 ModLoad: 003f0000 003f9000 C:\Users\Stefan\Downloads\MSIMG32.dll VrfKnthk!DllLoad: module 'MSIMG32.dll' loaded at 0x003F0000, size 0x00009000 ModLoad: 6c980000 6c985000 C:\Windows\SysWOW64\msimg32.DLL VrfKnthk!DllLoad: module 'msimg32.DLL' loaded at 0x6C980000, size 0x00005000 ModLoad: 01c10000 01c1b000 C:\Users\Stefan\Downloads\Secur32.dll VrfKnthk!DllLoad: module 'Secur32.dll' loaded at 0x01C10000, size 0x0000B000 ModLoad: 769a0000 76bf0000 C:\Windows\SysWOW64\WININET.dll ModLoad: 76530000 76534000 C:\Windows\SysWOW64\api-ms-win-downlevel-user32-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-user32-l1-1-0.dll' loaded at 0x76530000, size 0x00004000 ModLoad: 762b0000 762b4000 C:\Windows\SysWOW64\api-ms-win-downlevel-shlwapi-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-shlwapi-l1-1-0.dll' loaded at 0x762B0000, size 0x00004000 ModLoad: 762a0000 762a4000 C:\Windows\SysWOW64\api-ms-win-downlevel-version-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-version-l1-1-0.dll' loaded at 0x762A0000, size 0x00004000 ModLoad: 01c20000 01c29000 C:\Users\Stefan\Downloads\version.DLL VrfKnthk!DllLoad: module 'version.DLL' loaded at 0x01C20000, size 0x00009000 ModLoad: 74fc0000 74fc9000 C:\Windows\SysWOW64\version.DLL VrfKnthk!DllLoad: module 'version.DLL' loaded at 0x74FC0000, size 0x00009000 ModLoad: 75330000 75333000 C:\Windows\SysWOW64\api-ms-win-downlevel-normaliz-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-normaliz-l1-1-0.dll' loaded at 0x75330000, size 0x00003000 ModLoad: 76090000 76093000 C:\Windows\SysWOW64\normaliz.DLL VrfKnthk!DllLoad: module 'normaliz.DLL' loaded at 0x76090000, size 0x00003000 ModLoad: 76760000 76994000 C:\Windows\SysWOW64\iertutil.dll ModLoad: 76500000 76505000 C:\Windows\SysWOW64\api-ms-win-downlevel-advapi32-l1-1-0.dll VrfKnthk!DllLoad: module 'api-ms-win-downlevel-advapi32-l1-1-0.dll' loaded at 0x76500000, size 0x00005000 VrfKnthk!DllLoad: module 'iertutil.dll' loaded at 0x76760000, size 0x00234000 ModLoad: 76510000 76529000 C:\Windows\SysWOW64\USERENV.dll ModLoad: 76bf0000 76bfb000 C:\Windows\SysWOW64\profapi.dll VrfKnthk!DllLoad: module 'profapi.dll' loaded at 0x76BF0000, size 0x0000B000 VrfKnthk!DllLoad: module 'USERENV.dll' loaded at 0x76510000, size 0x00019000 VrfKnthk!DllLoad: module 'WININET.dll' loaded at 0x769A0000, size 0x00250000 VrfKnthk!DllLoad: module 'WAB32.DLL' loaded at 0x6AE40000, size 0x000B0000 LoadLibraryA(gdi32.dll) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 7666499F : LoadLibraryA 762E5604 : gdi32.dll 762F6260 : USP10.dll+0x00016260 762F65C6 : USP10.dll+0x000165C6 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 7666499F : LoadLibraryA 762E5604 : gdi32.dll 762F6260 : USP10.dll+0x00016260 762F65C6 : USP10.dll+0x000165C6 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryExA(gdi32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 762E5604 : gdi32.dll 766649D0 : kernel32.dll+0x000149D0 10002D50 : VrfKnthk.Dll+0x00002D50 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 762E5604 : gdi32.dll 766649D0 : kernel32.dll+0x000149D0 10002D50 : VrfKnthk.Dll+0x00002D50 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryW(C:\Windows\System32\IMM32.DLL) LoadLibraryExW(C:\Windows\System32\IMM32.DLL, 0x00000000, 0x00000000) ModLoad: 772a0000 77300000 C:\Windows\SysWOW64\IMM32.DLL ModLoad: 771d0000 7729d000 C:\Windows\SysWOW64\MSCTF.dll VrfKnthk!DllLoad: module 'MSCTF.dll' loaded at 0x771D0000, size 0x000CD000 VrfKnthk!DllLoad: module 'IMM32.DLL' loaded at 0x772A0000, size 0x00060000 LoadLibraryExW(C:\Windows\System32\AppInit.Dll, 0x00000000, 0x00000000) ModLoad: 01c60000 01c66000 C:\Windows\SysWOW64\AppInit.Dll VrfKnthk!DllLoad: module 'AppInit.Dll' loaded at 0x01C60000, size 0x00006000 VrfKnthk!DllUnload: module 'AppInit.Dll' unloaded from 0x01C60000, size 0x00006000 LoadLibraryExA(API-MS-Win-Security-LSALookup-L1-1-0.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 7625F2A0 : API-MS-Win-Security-LSALookup-L1-1-0.dll 762046AE : ADVAPI32.DLL+0x000146AE 76204810 : ADVAPI32.DLL+0x00014810 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 7625F2A0 : API-MS-Win-Security-LSALookup-L1-1-0.dll 762046AE : ADVAPI32.DLL+0x000146AE 76204810 : ADVAPI32.DLL+0x00014810 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryExA(API-MS-Win-Security-LSALookup-L1-1-0.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 7625F2A0 : API-MS-Win-Security-LSALookup-L1-1-0.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 762046AE : ADVAPI32.DLL+0x000146AE =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 7625F2A0 : API-MS-Win-Security-LSALookup-L1-1-0.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 762046AE : ADVAPI32.DLL+0x000146AE =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryExW(rpcrt4.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 7642E068 : rpcrt4.dll 7642F734 : RPCRT4.dll+0x0001F734 76461610 : RPCRT4.dll+0x00051610 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 7642E068 : rpcrt4.dll 7642F734 : RPCRT4.dll+0x0001F734 76461610 : RPCRT4.dll+0x00051610 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryExW(verifier.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 76474BF0 : verifier.dll 76473FF1 : RPCRT4.dll+0x00063FF1 7642F9C9 : RPCRT4.dll+0x0001F9C9 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 76474BF0 : verifier.dll 76473FF1 : RPCRT4.dll+0x00063FF1 7642F9C9 : RPCRT4.dll+0x0001F9C9 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryA(comctl32.dll) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 7666499F : LoadLibraryA 6B0017A8 : comctl32.dll 6B0017DB : msoert2.DLL+0x000017DB 6B001790 : msoert2.DLL+0x00001790 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 7666499F : LoadLibraryA 6B0017A8 : comctl32.dll 6B0017DB : msoert2.DLL+0x000017DB 6B001790 : msoert2.DLL+0x00001790 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryExA(comctl32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 6B0017A8 : comctl32.dll 766649D0 : kernel32.dll+0x000149D0 10002D50 : VrfKnthk.Dll+0x00002D50 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 6B0017A8 : comctl32.dll 766649D0 : kernel32.dll+0x000149D0 10002D50 : VrfKnthk.Dll+0x00002D50 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g ModLoad: 74710000 748ae000 C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.23403_none_2b180b30457f196c\comctl32.dll VrfKnthk!DllLoad: module 'comctl32.dll' loaded at 0x74710000, size 0x0019E000 LoadLibraryExA(api-ms-win-downlevel-advapi32-l1-1-0.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648DB : LoadLibraryExA 76B995F0 : api-ms-win-downlevel-advapi32-l1-1-0.dll 769A39B4 : WININET.dll+0x000039B4 769A3894 : WININET.dll+0x00003894 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648DB : LoadLibraryExA 76B995F0 : api-ms-win-downlevel-advapi32-l1-1-0.dll 769A39B4 : WININET.dll+0x000039B4 769A3894 : WININET.dll+0x00003894 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryExA(api-ms-win-downlevel-advapi32-l1-1-0.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402E40 : LoadLibraryExA 76B995F0 : api-ms-win-downlevel-advapi32-l1-1-0.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 769A39B4 : WININET.dll+0x000039B4 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402E40 : LoadLibraryExA 76B995F0 : api-ms-win-downlevel-advapi32-l1-1-0.dll 10002FF9 : VrfKnthk.Dll+0x00002FF9 769A39B4 : WININET.dll+0x000039B4 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryW(comctl32.dll) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648F3 : LoadLibraryW 6AE4A4EC : comctl32.dll 6AEBC164 : WAB32.DLL+0x0007C164 6AEBC2D8 : WAB32.DLL+0x0007C2D8 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648F3 : LoadLibraryW 6AE4A4EC : comctl32.dll 6AEBC164 : WAB32.DLL+0x0007C164 6AEBC2D8 : WAB32.DLL+0x0007C2D8 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryExW(comctl32.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 6AE4A4EC : comctl32.dll 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 6AE4A4EC : comctl32.dll 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryW(msftedit.dll) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 766648F3 : LoadLibraryW 6AE447BC : msftedit.dll 6AE78CC3 : WAB32.DLL+0x00038CC3 6AE5CBC2 : WAB32.DLL+0x0001CBC2 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 766648F3 : LoadLibraryW 6AE447BC : msftedit.dll 6AE78CC3 : WAB32.DLL+0x00038CC3 6AE5CBC2 : WAB32.DLL+0x0001CBC2 =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g LoadLibraryExW(msftedit.dll, 0x00000000, 0x00000000) =========================================================== VERIFIER STOP 0000FFFE: pid 0x580: The application or a component it uses called LoadLibrary*() with the filename or pathname of a not existing file (which might be searched via PATH). 75402BDC : LoadLibraryExW 6AE447BC : msftedit.dll 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g =========================================================== VERIFIER STOP 0000FFFF: pid 0x580: The application or a component it uses called LoadLibrary*() without providing an absolute local pathname for the module to load. 75402BDC : LoadLibraryExW 6AE447BC : msftedit.dll 76664904 : kernel32.dll+0x00014904 10002EAC : VrfKnthk.Dll+0x00002EAC =========================================================== This verifier stop is continuable. After debugging it use `go' to continue. =========================================================== (580.1bec): WOW64 breakpoint - code 4000001f (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. verifier_6aef0000!VerifierStopMessage+0x1f8: 6aefba58 cc int 3 0:000:x86> g ModLoad: 01cd0000 01cd9000 C:\Users\Stefan\Downloads\msftedit.dll VrfKnthk!DllLoad: module 'msftedit.dll' loaded at 0x01CD0000, size 0x00009000 VrfKnthk!DllUnload: module 'WAB32.DLL' unloaded from 0x6AE40000, size 0x000B0000 VrfKnthk!DllUnload: module 'WININET.dll' unloaded from 0x769A0000, size 0x00250000 VrfKnthk!DllUnload: module 'USERENV.dll' unloaded from 0x76510000, size 0x00019000 VrfKnthk!DllUnload: module 'profapi.dll' unloaded from 0x76BF0000, size 0x0000B000 VrfKnthk!DllUnload: module 'iertutil.dll' unloaded from 0x76760000, size 0x00234000 VrfKnthk!DllUnload: module 'api-ms-win-downlevel-normaliz-l1-1-0.dll' unloaded from 0x75330000, size 0x00003000 VrfKnthk!DllUnload: module 'api-ms-win-downlevel-version-l1-1-0.dll' unloaded from 0x762A0000, size 0x00004000 VrfKnthk!DllUnload: module 'api-ms-win-downlevel-shlwapi-l1-1-0.dll' unloaded from 0x762B0000, size 0x00004000 VrfKnthk!DllUnload: module 'api-ms-win-downlevel-user32-l1-1-0.dll' unloaded from 0x76530000, size 0x00004000 VrfKnthk!DllUnload: module 'Secur32.dll' unloaded from 0x01C10000, size 0x0000B000 VrfKnthk!DllUnload: module 'MSIMG32.dll' unloaded from 0x003F0000, size 0x00009000 VrfKnthk!DllUnload: module 'imagehlp.dll' unloaded from 0x75190000, size 0x0002B000 VrfKnthk!DllUnload: module 'UxTheme.dll' unloaded from 0x003E0000, size 0x0000B000 VrfKnthk!DllUnload: module 'SHELL32.dll' unloaded from 0x75440000, size 0x00C4C000 VrfKnthk!DllUnload: module 'MSOERT2.dll' unloaded from 0x002E0000, size 0x0000C000 VrfKnthk!DllUnload: module 'CRYPTDLG.dll' unloaded from 0x002B0000, size 0x00009000 VrfKnthk!DllUnload: module 'msftedit.dll' unloaded from 0x01CD0000, size 0x00009000 VrfKnthk!DllUnload: module 'normaliz.DLL' unloaded from 0x76090000, size 0x00003000 VrfKnthk!DllUnload: module 'version.DLL' unloaded from 0x01C20000, size 0x00009000 VrfKnthk!DllUnload: module 'msimg32.DLL' unloaded from 0x6C980000, size 0x00005000 VrfKnthk!DllUnload: module 'uxtheme.DLL' unloaded from 0x741C0000, size 0x00080000 VrfKnthk!DllUnload: module 'msoert2.DLL' unloaded from 0x6B000000, size 0x0001C000 VrfKnthk!DllUnload: module 'OLEAUT32.dll' unloaded from 0x765C0000, size 0x0008F000 VrfKnthk!DllUnload: module 'ole32.dll' unloaded from 0x76CB0000, size 0x0015D000 VrfKnthk!DllUnload: module 'cryptdlg.DLL' unloaded from 0x6B1B0000, size 0x00009000 VrfKnthk!DllUnload: module 'CRYPTUI.dll' unloaded from 0x002C0000, size 0x0000A000 VrfKnthk!DllUnload: module 'WINTRUST.dll' unloaded from 0x751D0000, size 0x0002F000 VrfKnthk!DllUnload: module 'version.DLL' unloaded from 0x74FC0000, size 0x00009000 VrfKnthk!DllUnload: module 'cryptui.DLL' unloaded from 0x6A860000, size 0x000F8000 VrfKnthk!DllUnload: module 'CRYPT32.dll' unloaded from 0x75200000, size 0x00121000 VrfKnthk!DllUnload: module 'MSASN1.dll' unloaded from 0x760B0000, size 0x0000C000 VrfKnthk!DllMain(0x10000000, 0x00000000 = DLL_PROCESS_DETACH, 0x00000001) VrfKnthk!DllMain: VerifierImage = 0x03511E0A = EXAMPLE.EXE, VerifierFlags = 0x80000000, VerifierDebug = 0x00000000 ntdll!NtTerminateProcess+0xa: 00000000`775fbdfa c3 ret 0:000> q