Also I don't know if this one helps or not, it's the output from the pylotro patcher window. Code: Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x4316d100). Register dump: CS:0017 SS:001f DS:001f ES:001f FS:1007 GS:0037 EIP:4316d100 ESP:0033fcc0 EBP:0033fd08 EFLAGS:00010202( R- -- I - - - ) EAX:00000000 EBX:4316d0c9 ECX:0033fcc0 EDX:00010080 ESI:10004bb0 EDI:00000001 Stack dump: 0x0033fcc0: 00220620 00000000 7b818699 7b8440dc 0x0033fcd0: 00133f90 00110000 00000000 00133f88 0x0033fce0: 00000001 10040734 00000010 00000010 0x0033fcf0: 0033fd9c 7b9698a0 0033fd18 405a72ac 0x0033fd00: 10004bb0 00000001 0033fe28 10004bbb 0x0033fd10: 0033fe48 10004bbb 10040734 405a765b 0200: sel=1007 base=7ffc0000 limit=00000fff 32-bit rw- Backtrace: =>0 0x4316d100 (0x0033fd08) 1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28) 2 0x405a7f0a (0x0033fea8) 3 0x405a7e58 (0x0033fec8) 4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8) 5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28) 6 0x7bc63e0c (0x0033ff48) 7 0x7bc64fea (0x0033ffc8) 8 0x7bc3d95e (0x0033ffe8) 0x4316d100: movl 0x0(%eax),%edx Modules: Module Address Debug info Name (23 modules) PE 340000- 352000 Deferred zlib1t PE 10000000-100a3000 Export patchclient PE 405a0000-405a3000 Deferred rundll32 PE 405b0000-405b4000 Deferred version PE 40710000-40714000 Deferred gdi32 PE 42560000-42597000 Deferred user32 PE 426b0000-426b4000 Deferred advapi32 PE 42d80000-42d84000 Deferred winex11 PE 42fb0000-42fb4000 Deferred imm32 PE 43140000-43143000 Deferred msvcr71 PE 43150000-43154000 Deferred msvcrt PE 431f0000-431f4000 Deferred rpcrt4 PE 43280000-4328c000 Deferred wininet PE 432e0000-432e8000 Deferred mpr PE 43310000-43317000 Deferred shlwapi PE 43380000-434b8000 Deferred shell32 PE 435a0000-435cb000 Deferred comctl32 PE 436b0000-436b4000 Deferred ws2_32 PE 436f0000-43752000 Deferred winmm PE 43790000-43794000 Deferred uxtheme PE 437c0000-437c4000 Deferred ole32 PE 7b810000-7b8f9000 Export kernel32 PE 7bc10000-7bc14000 Deferred ntdll Threads: process tid prio (all id:s are in hex) 00000008 pylotro.exe 0000001d 0 0000001c 0 00000009 0 0000000e services.exe 00000016 0 00000015 0 00000014 0 00000010 0 0000000f 0 00000011 winedevice.exe 00000018 0 00000017 0 00000013 0 00000012 0 00000019 explorer.exe 0000001a 0 0000001e (D) C:\windows\system32\rundll32.exe 0000001f 0 <== Backtrace: =>0 0x4316d100 (0x0033fd08) 1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28) 2 0x405a7f0a (0x0033fea8) 3 0x405a7e58 (0x0033fec8) 4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8) 5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28) 6 0x7bc63e0c (0x0033ff48) 7 0x7bc64fea (0x0033ffc8) 8 0x7bc3d95e (0x0033ffe8) Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x4316d100). Register dump: CS:0017 SS:001f DS:001f ES:001f FS:1007 GS:0037 EIP:4316d100 ESP:0033fcc0 EBP:0033fd08 EFLAGS:00010202( R- -- I - - - ) EAX:00000000 EBX:4316d0c9 ECX:0033fcc0 EDX:0002008a ESI:10004bb0 EDI:00000001 Stack dump: 0x0033fcc0: 00220620 00000000 7b818699 7b8440dc 0x0033fcd0: 00133f90 00110000 00000000 00133f88 0x0033fce0: 00000001 10040734 00000010 00000010 0x0033fcf0: 0033fd9c 7b9698a0 0033fd18 404a72ac 0x0033fd00: 10004bb0 00000001 0033fe28 10004bbb 0x0033fd10: 0033fe48 10004bbb 10040734 404a765b 0200: sel=1007 base=7ffc0000 limit=00000fff 32-bit rw- Backtrace: =>0 0x4316d100 (0x0033fd08) 1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28) 2 0x404a7f0a (0x0033fea8) 3 0x404a7e58 (0x0033fec8) 4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8) 5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28) 6 0x7bc63e0c (0x0033ff48) 7 0x7bc64fea (0x0033ffc8) 8 0x7bc3d95e (0x0033ffe8) 0x4316d100: movl 0x0(%eax),%edx Modules: Module Address Debug info Name (23 modules) PE 340000- 352000 Deferred zlib1t PE 10000000-100a3000 Export patchclient PE 404a0000-404a3000 Deferred rundll32 PE 404b0000-404b4000 Deferred version PE 40710000-40714000 Deferred gdi32 PE 42560000-42597000 Deferred user32 PE 426b0000-426b4000 Deferred advapi32 PE 42d80000-42d84000 Deferred winex11 PE 42fb0000-42fb4000 Deferred imm32 PE 43140000-43143000 Deferred msvcr71 PE 43150000-43154000 Deferred msvcrt PE 431f0000-431f4000 Deferred rpcrt4 PE 43280000-4328c000 Deferred wininet PE 432e0000-432e8000 Deferred mpr PE 43310000-43317000 Deferred shlwapi PE 43380000-434b8000 Deferred shell32 PE 435a0000-435cb000 Deferred comctl32 PE 436b0000-436b4000 Deferred ws2_32 PE 436f0000-43752000 Deferred winmm PE 43790000-43794000 Deferred uxtheme PE 437c0000-437c4000 Deferred ole32 PE 7b810000-7b8f9000 Export kernel32 PE 7bc10000-7bc14000 Deferred ntdll Threads: process tid prio (all id:s are in hex) 00000008 pylotro.exe 0000001d 0 0000001c 0 00000009 0 0000000e services.exe 00000016 0 00000015 0 00000014 0 00000010 0 0000000f 0 00000011 winedevice.exe 00000018 0 00000017 0 00000013 0 00000012 0 00000019 explorer.exe 0000001a 0 00000022 (D) C:\windows\system32\rundll32.exe 00000023 0 <== Backtrace: =>0 0x4316d100 (0x0033fd08) 1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28) 2 0x404a7f0a (0x0033fea8) 3 0x404a7e58 (0x0033fec8) 4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8) 5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28) 6 0x7bc63e0c (0x0033ff48) 7 0x7bc64fea (0x0033ffc8) 8 0x7bc3d95e (0x0033ffe8) Unhandled exception: page fault on read access to 0x00000000 in 32-bit code (0x4316d100). Register dump: CS:0017 SS:001f DS:001f ES:001f FS:1007 GS:0037 EIP:4316d100 ESP:0033fcc0 EBP:0033fd08 EFLAGS:00010202( R- -- I - - - ) EAX:00000000 EBX:4316d0c9 ECX:0033fcc0 EDX:00030088 ESI:10004bb0 EDI:00000001 Stack dump: 0x0033fcc0: 00220620 00000000 7b818699 7b8440dc 0x0033fcd0: 00133f90 00110000 00000000 00133f88 0x0033fce0: 00000001 10040734 00000010 00000010 0x0033fcf0: 0033fd9c 7b9698a0 0033fd18 404a72ac 0x0033fd00: 10004bb0 00000001 0033fe28 10004bbb 0x0033fd10: 0033fe48 10004bbb 10040734 404a765b 0200: sel=1007 base=7ffc0000 limit=00000fff 32-bit rw- Backtrace: =>0 0x4316d100 (0x0033fd08) 1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28) 2 0x404a7f0a (0x0033fea8) 3 0x404a7e58 (0x0033fec8) 4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8) 5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28) 6 0x7bc63e0c (0x0033ff48) 7 0x7bc64fea (0x0033ffc8) 8 0x7bc3d95e (0x0033ffe8) 0x4316d100: movl 0x0(%eax),%edx Modules: Module Address Debug info Name (23 modules) PE 340000- 352000 Deferred zlib1t PE 10000000-100a3000 Export patchclient PE 404a0000-404a3000 Deferred rundll32 PE 404b0000-404b4000 Deferred version PE 40710000-40714000 Deferred gdi32 PE 42560000-42597000 Deferred user32 PE 426b0000-426b4000 Deferred advapi32 PE 42d80000-42d84000 Deferred winex11 PE 42fb0000-42fb4000 Deferred imm32 PE 43140000-43143000 Deferred msvcr71 PE 43150000-43154000 Deferred msvcrt PE 431f0000-431f4000 Deferred rpcrt4 PE 43280000-4328c000 Deferred wininet PE 432e0000-432e8000 Deferred mpr PE 43310000-43317000 Deferred shlwapi PE 43380000-434b8000 Deferred shell32 PE 435a0000-435cb000 Deferred comctl32 PE 436b0000-436b4000 Deferred ws2_32 PE 436f0000-43752000 Deferred winmm PE 43790000-43794000 Deferred uxtheme PE 437c0000-437c4000 Deferred ole32 PE 7b810000-7b8f9000 Export kernel32 PE 7bc10000-7bc14000 Deferred ntdll Threads: process tid prio (all id:s are in hex) 00000008 pylotro.exe 0000001d 0 0000001c 0 00000009 0 0000000e services.exe 00000016 0 00000015 0 00000014 0 00000010 0 0000000f 0 00000011 winedevice.exe 00000018 0 00000017 0 00000013 0 00000012 0 00000019 explorer.exe 0000001a 0 00000026 (D) C:\windows\system32\rundll32.exe 00000027 0 <== Backtrace: =>0 0x4316d100 (0x0033fd08) 1 0x10004bbb in patchclient (+0x4bba) (0x0033fe28) 2 0x404a7f0a (0x0033fea8) 3 0x404a7e58 (0x0033fec8) 4 0x7b84bc8c in kernel32 (+0x3bc8b) (0x0033fee8) 5 0x7b84e2d7 in kernel32 (+0x3e2d6) (0x0033ff28) 6 0x7bc63e0c (0x0033ff48) 7 0x7bc64fea (0x0033ffc8) 8 0x7bc3d95e (0x0033ffe8) *** Finished ***