Opened log file 'debug.txt' 0:004> !locks CritSec ntdll!LdrpLoaderLock+0 at 77d120c0 WaiterWoken No LockCount 1 RecursionCount 1 OwningThread 418 EntryCount 0 ContentionCount 2 *** Locked CritSec nvdaHelperRemote!inprocThreadsLock+4 at 6d9d17e4 WaiterWoken No LockCount 1 RecursionCount 1 OwningThread 1878 EntryCount 0 ContentionCount 1 *** Locked Scanned 332 critical sections 0:004> ~*kb 0 Id: 14fc.1878 Suspend: 1 Teb: 7efdd000 Unfrozen ChildEBP RetAddr Args to Child 0027e700 77c48e44 00000154 00000000 00000000 ntdll!ZwWaitForSingleObject+0x15 0027e764 77c48d28 00000000 00000000 00000001 ntdll!RtlpWaitOnCriticalSection+0x13e 0027e78c 77c46c30 77d120c0 7527e608 00000000 ntdll!RtlEnterCriticalSection+0x150 0027e7c4 7631190f 00000001 00000000 0027e7ec ntdll!LdrLockLoaderLock+0xe4 0027e810 765d8b2c 6d910000 0027e82c 00000104 KERNELBASE!GetModuleFileNameW+0x75 0027ea38 765d761b 00000003 6d922760 6d910000 USER32!SetWindowsHookExAW+0x34 0027ea54 6d912b7f 00000003 6d922760 6d910000 USER32!SetWindowsHookExW+0x18 0027eb44 6d914307 004604a7 00000003 001201de nvdaHelperRemote!inproc_winEventCallback+0xbf [c:\projects\in_progress\nvda\build\x86\remote\injection.cpp @ 66] 0027eb6c 765d33ff 00a803cb 00000003 001201de nvdaHelperRemote!injection_winEventCallback+0x57 [c:\projects\in_progress\nvda\build\x86\remote\injection.cpp @ 274] 0027ebac 77c2010a 0027ebc4 00000000 0027ecdc USER32!__ClientCallWinEventProc+0x2e 0027ebc0 6d9142af 00a803cb 00000003 001201de ntdll!KiUserCallbackDispatcher+0x2e 0027ec0c 1d1aca06 1d1ac880 0027ec2c 0000001c nvdaHelperRemote!initInprocManagerThreadIfNeeded+0x60f WARNING: Stack unwind information not available. Following frames may be wrong. 0027ec3c 1d1a8d28 765c8e4e 0027ed50 5a732359 _ctypes!DllCanUnloadNow+0x4866 0027ecec 1d1a950e 00001100 765c8e4e 0027ed30 _ctypes!DllCanUnloadNow+0xb88 0027ee04 1d1a5448 765c8e4e 024603b0 00000000 _ctypes!DllCanUnloadNow+0x136e 0027ee5c 1e07b92c 00000000 024603b0 00000000 _ctypes+0x5448 00000000 00000000 00000000 00000000 00000000 python27!PyObject_Call+0x4c 1 Id: 14fc.124c Suspend: 1 Teb: 7efda000 Unfrozen ChildEBP RetAddr Args to Child 0308fc48 763115f7 00000002 0308fc98 00000001 ntdll!NtWaitForMultipleObjects+0x15 0308fce4 75c719f8 0308fc98 0308fd0c 00000000 KERNELBASE!WaitForMultipleObjectsEx+0x100 0308fd2c 765d086a 00000002 7efde000 00000000 kernel32!WaitForMultipleObjectsExImplementation+0xe0 0308fd80 765d0b69 00000120 6d9d1e58 ffffffff USER32!RealMsgWaitForMultipleObjectsEx+0x14d 0308fd9c 6d913b39 00000001 6d9d1e58 00000000 USER32!MsgWaitForMultipleObjects+0x1f 0308ff88 75c7338a 00000118 0308ffd4 77c49f72 nvdaHelperRemote!inprocMgrThreadFunc+0x709 [c:\projects\in_progress\nvda\build\x86\remote\injection.cpp @ 200] 0308ff94 77c49f72 00000118 7608fe18 00000000 kernel32!BaseThreadInitThunk+0xe 0308ffd4 77c49f45 6d913430 00000118 00000000 ntdll!__RtlUserThreadStart+0x70 0308ffec 00000000 6d913430 00000118 00000000 ntdll!_RtlUserThreadStart+0x1b 2 Id: 14fc.15f8 Suspend: 1 Teb: 7efd7000 Unfrozen ChildEBP RetAddr Args to Child 0327fe28 77c63392 00000140 0327fedc 7627fe44 ntdll!NtWaitForWorkViaWorkerFactory+0x12 0327ff88 75c7338a 00469018 0327ffd4 77c49f72 ntdll!TppWorkerThread+0x216 0327ff94 77c49f72 00469018 7627fe18 00000000 kernel32!BaseThreadInitThunk+0xe 0327ffd4 77c49f45 77c63e85 00469018 00000000 ntdll!__RtlUserThreadStart+0x70 0327ffec 00000000 77c63e85 00469018 00000000 ntdll!_RtlUserThreadStart+0x1b 3 Id: 14fc.418 Suspend: 1 Teb: 7ef4f000 Unfrozen ChildEBP RetAddr Args to Child 0356fa64 77c48e44 00000174 00000000 00000000 ntdll!ZwWaitForSingleObject+0x15 0356fac8 77c48d28 00000000 00000000 00000000 ntdll!RtlpWaitOnCriticalSection+0x13e 0356faf0 6d91c79e 6d9d17e4 0356fb0c 6d9d17e0 ntdll!RtlEnterCriticalSection+0x150 0356fb04 6d913030 592923b0 0356fc84 00000418 nvdaHelperRemote!LockableObject::acquire+0x1e [c:\projects\in_progress\nvda\build\x86\common\lock.h @ 43] 0356fb80 1038d3f7 00000004 1038d630 10000000 nvdaHelperRemote!fake_SetWindowsHookExA+0xc0 [c:\projects\in_progress\nvda\build\x86\remote\injection.cpp @ 104] WARNING: Stack unwind information not available. Following frames may be wrong. 0356fba0 1039b3a0 10000000 00000002 00000000 ig7icd32!DrvValidateVersion+0x767 0356fbe0 1039b327 10000000 00000002 00000000 ig7icd32!DllMain+0xda10 0356fbf4 77c499a0 10000000 00000002 00000000 ig7icd32!DllMain+0xd997 0356fc14 77c4a1e6 1039b30b 10000000 00000002 ntdll!LdrpCallInitRoutine+0x14 0356fcb4 77c49ecc 0356fd24 7656fccc 00000000 ntdll!LdrpInitializeThread+0x15b 0356fd00 77c49ef9 0356fd24 77c10000 00000000 ntdll!_LdrpInitialize+0x1ad 0356fd10 00000000 0356fd24 77c10000 00000000 ntdll!LdrInitializeThunk+0x10 # 4 Id: 14fc.1840 Suspend: 1 Teb: 7ef4c000 Unfrozen ChildEBP RetAddr Args to Child 0375ff58 77caf926 7675fe44 00000000 00000000 ntdll!DbgBreakPoint 0375ff88 75c7338a 00000000 0375ffd4 77c49f72 ntdll!DbgUiRemoteBreakin+0x3c 0375ff94 77c49f72 00000000 7675fe18 00000000 kernel32!BaseThreadInitThunk+0xe 0375ffd4 77c49f45 77caf8ea 00000000 00000000 ntdll!__RtlUserThreadStart+0x70 0375ffec 00000000 77caf8ea 00000000 00000000 ntdll!_RtlUserThreadStart+0x1b 0:004> .logclose Closing open log file debug.txt