CommandLine: C:\Python31\python.exe Symbol search path is: *** Invalid *** **************************************************************************** * Symbol loading may be unreliable without a symbol search path. * * Use .symfix to have the debugger choose a symbol path. * * After setting your symbol path, use .reload to refresh symbol locations. * **************************************************************************** Executable search path is: ModLoad: 00000000`1d000000 00000000`1d00b000 python.exe ModLoad: 00000000`77c50000 00000000`77dfb000 ntdll.dll ModLoad: 000007fe`f27c0000 000007fe`f282e000 C:\Windows\system32\verifier.dll Page heap: pid 0xEF4: page heap enabled with flags 0x3. AVRF: python.exe: pid 0xEF4: flags 0x80E43267: application verifier enabled ModLoad: 000007fe`f2860000 000007fe`f2893000 C:\Windows\SYSTEM32\vrfcore.dll ModLoad: 000007fe`f2750000 000007fe`f27b1000 C:\Windows\SYSTEM32\vfbasics.dll ModLoad: 000007fe`f3100000 000007fe`f3136000 C:\Windows\SYSTEM32\vfluapriv.dll ModLoad: 000007fe`ff4f0000 000007fe`ff58f000 C:\Windows\system32\msvcrt.dll ModLoad: 000007fe`fde30000 000007fe`fde9b000 C:\Windows\system32\KERNELBASE.dll ModLoad: 00000000`77a30000 00000000`77b4f000 C:\Windows\SYSTEM32\kernel32.dll ModLoad: 00000000`77e20000 00000000`77e27000 C:\Windows\system32\PSAPI.DLL ModLoad: 000007fe`ffda0000 000007fe`ffe7b000 C:\Windows\system32\ADVAPI32.dll ModLoad: 000007fe`ff3a0000 000007fe`ff3bf000 C:\Windows\SYSTEM32\sechost.dll ModLoad: 000007fe`ff190000 000007fe`ff2be000 C:\Windows\system32\RPCRT4.dll ModLoad: 000007fe`ffa80000 000007fe`ffc81000 C:\Windows\system32\ole32.dll ModLoad: 000007fe`ff590000 000007fe`ff5f7000 C:\Windows\system32\GDI32.dll ModLoad: 00000000`77b50000 00000000`77c4a000 C:\Windows\system32\USER32.dll ModLoad: 000007fe`ff310000 000007fe`ff31e000 C:\Windows\system32\LPK.dll ModLoad: 000007fe`fee90000 000007fe`fef5a000 C:\Windows\system32\USP10.dll ModLoad: 000007fe`fcd20000 000007fe`fcd2c000 C:\Windows\SYSTEM32\VERSION.dll ModLoad: 000007fe`f2d80000 000007fe`f2d9e000 C:\Windows\SYSTEM32\vfcompat.dll ModLoad: 000007fe`eea20000 000007fe`eeab6000 C:\Windows\SYSTEM32\msvcp60.dll ModLoad: 000007fe`f2610000 000007fe`f2677000 C:\Windows\SYSTEM32\vfprint.dll ModLoad: 000007fe`f5900000 000007fe`f590c000 C:\Windows\SYSTEM32\vfntlmless.dll ModLoad: 000007fe`ff990000 000007fe`ff9be000 C:\Windows\system32\IMM32.DLL ModLoad: 000007fe`ffc90000 000007fe`ffd99000 C:\Windows\system32\MSCTF.dll LuaPriv: Attaching to process... -- LuaPriv initialized-- ModLoad: 00000000`1e000000 00000000`1e2b0000 C:\Windows\system32\python31.dll ModLoad: 000007fe`fdf80000 000007fe`fed06000 C:\Windows\system32\SHELL32.dll ModLoad: 000007fe`ff320000 000007fe`ff391000 C:\Windows\system32\SHLWAPI.dll ModLoad: 00000000`71000000 00000000`7109d000 C:\Windows\WinSxS\amd64_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.4926_none_08e1a05ba83fe554\MSVCR90.dll (ef4.c2c): Break instruction exception - code 80000003 (first chance) *** ERROR: Symbol file could not be found. Defaulted to export symbols for ntdll.dll - ntdll!CsrSetPriorityClass+0x40: 00000000`77d01220 cc int 3 0:000> g (ef4.c2c): Stack overflow - code c00000fd (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. ntdll!RtlLookupFunctionTable+0x36: 00000000`77c85346 e8c5c6ffff call ntdll!RtlAcquireSRWLockShared (00000000`77c81a10) 0:000> g (ef4.c2c): Access violation - code c0000005 (first chance) First chance exceptions are reported before any exception handling. This exception may be expected and handled. ntdll!RtlGetGroupSecurityDescriptor+0x21b: 00000000`77c56e0b 57 push rdi