000e:Call ntdll.RtlAllocateHeap(41210000,00000000,00000030) ret=7c3416b3 000e:trace:heap:RtlAllocateHeap (0x41210000,00000002,00000030): returning 0x46927938 000e:Ret ntdll.RtlAllocateHeap() retval=46927938 ret=7c3416b3 000e:Call ntdll.RtlReAllocateHeap(41210000,00000000,4692a240,00000238) ret=7c3527e9 000e:trace:heap:RtlReAllocateHeap (0x41210000,00000002,0x4692a240,00000238): returning 0x46927970 000e:Ret ntdll.RtlReAllocateHeap() retval=46927970 ret=7c3527e9 000e:trace:seh:__regs_RtlRaiseException code=c0000005 flags=0 addr=0x1133572a 000e:trace:seh:__regs_RtlRaiseException info[0]=00000000 000e:trace:seh:__regs_RtlRaiseException info[1]=00000000 000e:trace:seh:__regs_RtlRaiseException eax=00000001 ebx=00000000 ecx=00000000 edx=00000000 esi=456b68b8 edi=46929d50 000e:trace:seh:__regs_RtlRaiseException ebp=456b6880 esp=456b6598 cs=0073 ds=007b es=007b fs=003b gs=0033 flags=00010246 000e:Call ntdll.RtlEnterCriticalSection(4148f460) ret=41440765 000e:Ret ntdll.RtlEnterCriticalSection() retval=00000000 ret=41440765 000e:Call ntdll.RtlLeaveCriticalSection(4148f460) ret=414407a6 000e:Ret ntdll.RtlLeaveCriticalSection() retval=00000000 ret=414407a6 000e:trace:seh:EXC_CallHandler calling handler at 0x113f6cae code=c0000005 flags=0 ... Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x1133572a). Backtrace: =>1 0x1133572a in snoopy (+0x18572a) (0x456b6880) 2 0x11337e52 in snoopy (+0x187e52) (0x00000000) 0x1133572a: movl 0x0(%ebx),%ecx Modules: Module Address Debug info Name (140 modules) PE 0x111b0000-1149b000 Export snoopy Threads: process tid prio (all id:s are in hex) 00000016 0 00000015 0 00000014 0 00000012 0 00000010 0 0000000f 0 0000000e 0 <== 0000000d 0 0000000c 0 0000000b 0 0000000a 0 00000009 0