I recently got a Motion Computing M1300 Centrino-based tablet, with Windows XP Tablet Edition installed, and installed a copy of Daemon Tools 3.33. I've been a long-time user, and this is a new problem for me. Any time I mount an image, the image mounts, but then daemon.exe causes an access violation (C0000005). Stack trace at end of message, and user.dmp file easily generatable...
Error caused by SetWindowPlacement making a call into address 54591518, which is not mapped to any loaded memory space, and the address is invalid.
0012ef48 77d67ad7 00337b40 0000001c 00000000 0x54591518
0012ef74 77d6ccd4 00170188 00030480 0000001c USER32!SetWindowPlacement+0x57
0012efdc 77d445bd 00000000 00170188 00030480 USER32!DefRawInputProc+0x284
0012f030 77d447d4 00647da8 0000001c 00000000 USER32!TranslateMessageEx+0x78d
0012f058 77f75da3 0012f068 00000018 00647da8 USER32!DefWindowProcA+0x209
0012f0b4 77d746fe 00050488 00010192 00000010 ntdll!KiUserCallbackDispatcher+0x13
0012f0dc 77d6644e 00400000 00414ef8 00010192 USER32!CheckRadioButton+0x132
0012f0fc 77d6e97e 00400000 00414ef8 00010192 USER32!DialogBoxIndirectParamAorW+0x35
0012f128 00402073 00400000 00000067 00010192 USER32!DialogBoxParamA+0x4a
00010192 00430000 006d006f 00700053 00630065 daemon+0x2073
0050004f 000000e1 05030500 00000000 279de000 0x430000
Error caused by SetWindowPlacement making a call into address 54591518, which is not mapped to any loaded memory space, and the address is invalid.
0012ef48 77d67ad7 00337b40 0000001c 00000000 0x54591518
0012ef74 77d6ccd4 00170188 00030480 0000001c USER32!SetWindowPlacement+0x57
0012efdc 77d445bd 00000000 00170188 00030480 USER32!DefRawInputProc+0x284
0012f030 77d447d4 00647da8 0000001c 00000000 USER32!TranslateMessageEx+0x78d
0012f058 77f75da3 0012f068 00000018 00647da8 USER32!DefWindowProcA+0x209
0012f0b4 77d746fe 00050488 00010192 00000010 ntdll!KiUserCallbackDispatcher+0x13
0012f0dc 77d6644e 00400000 00414ef8 00010192 USER32!CheckRadioButton+0x132
0012f0fc 77d6e97e 00400000 00414ef8 00010192 USER32!DialogBoxIndirectParamAorW+0x35
0012f128 00402073 00400000 00000067 00010192 USER32!DialogBoxParamA+0x4a
00010192 00430000 006d006f 00700053 00630065 daemon+0x2073
0050004f 000000e1 05030500 00000000 279de000 0x430000
Comment