ID:101006
 
Descriptive Problem Summary:
Well, sometimes using some commands or just entering some maps causes the dream seeker to crash saying 0x****** error. Sometimes doesn't say anything.
Numbered Steps to Reproduce Problem:
In some games as SS13 or Bleach Unleashed bankai it just does that by seeing an object, or entering a map.

Does the problem occur:
Every time? Or how often?
every time.
In other games?
As i Stated on SS13 (space station 13) and Bleach unleashed bankai.
In other user accounts?
Yes.
On other computers?
Never tried.
When does the problem NOT occur?
I don't really know... Maybe when you avoid such objects.
Did the problem NOT occur in any earlier versions? If so, what was the last version that worked? As far as I remember, the last verson was 473.
You have not provided us any information we could use to reproduce or trace the issue. What we need is a full set of crash details, specifically listing which module crashed and at which offset. You can obtain these details by going to Start | Run... and entering "drwtsn32 -i" which will enable Dr. Watson, and after the next crash it should provide a minidump whose contents you can add to this report in a followup comment.


Application exception occurred:
App: C:\Program Files\BYOND\bin\dreamseeker.exe (pid=3032)
When: 6/28/2010 @ 14:44:02.734
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: HOME-B13B5FF4BF
User Name: Uodas
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 6 Model 8 Stepping 1
Windows Version: 5.1
Current Build: 2600
Service Pack: 3
Current Type: Uniprocessor Free
Registered Organization: Home
Registered Owner: Mantas

*----> Task List <----*
0 System Process
4 System
804 smss.exe
884 csrss.exe
908 winlogon.exe
952 services.exe
964 lsass.exe
1124 svchost.exe
1192 svchost.exe
1300 svchost.exe
1392 svchost.exe
1520 svchost.exe
1816 Explorer.EXE
1832 afwServ.exe
1952 AvastSvc.exe
2008 TSVNCache.exe
236 SOUNDMAN.EXE
188 avastUI.exe
276 jusched.exe
332 ctfmon.exe
432 winamp.exe
260 spoolsv.exe
2304 svchost.exe
2340 skypePM.exe
2384 jqs.exe
2508 svchost.exe
2604 wdfmgr.exe
528 alg.exe
316 byond.exe
3764 iexplore.exe
1356 iexplore.exe
3032 dreamseeker.exe
840 avast.setup
2972 setup.ovr
3200 SkypeNames2.exe
2084 drwtsn32.exe

*----> Module List <----*
(0000000000330000 - 0000000000376000: C:\Program Files\BYOND\bin\byondext.dll
(0000000000380000 - 0000000000391000: C:\WINDOWS\system32\MSVCIRT.dll
(0000000000400000 - 000000000047c000: C:\Program Files\BYOND\bin\dreamseeker.exe
(0000000000480000 - 0000000000645000: C:\Program Files\BYOND\bin\byondcore.dll
(0000000001980000 - 0000000001c45000: C:\WINDOWS\system32\xpsp2res.dll
(0000000001d60000 - 0000000001d69000: C:\WINDOWS\system32\Normaliz.dll
(0000000001db0000 - 0000000001dd9000: C:\WINDOWS\system32\msls31.dll
(0000000010000000 - 000000001016b000: C:\Program Files\BYOND\bin\byondwin.dll
(0000000016080000 - 0000000016099000: C:\Program Files\Bonjour\mdnsNSP.dll
(000000003cea0000 - 000000003d450000: C:\WINDOWS\system32\mshtml.dll
(000000003d930000 - 000000003da16000: C:\WINDOWS\system32\WININET.dll
(000000003dfd0000 - 000000003e1b8000: C:\WINDOWS\system32\iertutil.dll
(000000003e1c0000 - 000000003ec54000: C:\WINDOWS\system32\ieframe.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UXTHEME.DLL
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\COMCTL32.dll
(0000000066000000 - 000000006609b000: C:\Program Files\Stardock\Object Desktop\WindowBlinds\wblind.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000066600000 - 0000000066617000: C:\Program Files\Stardock\Object Desktop\WindowBlinds\wbhelp.dll
(000000006d990000 - 000000006d996000: C:\WINDOWS\system32\d3d8thk.dll
(000000006d9a0000 - 000000006dac8000: C:\WINDOWS\system32\d3d8.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\System32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(00000000732e0000 - 00000000732e5000: C:\WINDOWS\system32\RICHED32.DLL
(0000000073dd0000 - 0000000073ece000: C:\WINDOWS\system32\MFC42.DLL
(00000000746f0000 - 000000007471a000: C:\WINDOWS\system32\msimtf.dll
(0000000074720000 - 000000007476c000: C:\WINDOWS\system32\MSCTF.dll
(0000000074e30000 - 0000000074e9d000: C:\WINDOWS\system32\RICHED20.dll
(00000000755c0000 - 00000000755ee000: C:\WINDOWS\system32\msctfime.ime
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\MLANG.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\MSIMG32.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076bf0000 - 0000000076bfb000: C:\WINDOWS\system32\PSAPI.DLL
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\Iphlpapi.dll
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: C:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ab000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000773d0000 - 00000000774d3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595 b64144ccf1df_6.0.2600.5512_x-ww_35d4ce83\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\MSVCRT.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f02000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f59000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(0000000078130000 - 0000000078263000: C:\WINDOWS\system32\urlmon.dll
(000000007c800000 - 000000007c8f6000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b2000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d7000: C:\WINDOWS\system32\SHELL32.dll
(000000007e410000 - 000000007e4a1000: C:\WINDOWS\system32\USER32.dll
(000000007e720000 - 000000007e7d0000: C:\WINDOWS\system32\SXS.DLL

*----> State Dump for Thread Id 0xddc <----*

eax=020b448c ebx=000000cb ecx=0cc18000 edx=00cbcbcb esi=00000018 edi=01477428
eip=0040482c esp=0012ec54 ebp=0cc17fa0 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

*** WARNING: Unable to verify checksum for C:\Program Files\BYOND\bin\dreamseeker.exe
*** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\BYOND\bin\dreamseeker.exe
function: dreamseeker
00404812 56 push esi
00404813 8b5704 mov edx,[edi+0x4]
00404816 33f6 xor esi,esi
00404818 85d2 test edx,edx
0040481a 8bcd mov ecx,ebp
0040481c 7e22 jle dreamseeker+0x4840 (00404840)
0040481e 8b10 mov edx,[eax]
00404820 83c004 add eax,0x4
00404823 89542414 mov [esp+0x14],edx
00404827 668b5c2416 mov bx,[esp+0x16]
FAULT ->0040482c 8819 mov [ecx],bl ds:0023:0cc18000=00
0040482e 41 inc ecx
0040482f 8831 mov [ecx],dh
00404831 41 inc ecx
00404832 8811 mov [ecx],dl
00404834 41 inc ecx
00404835 8839 mov [ecx],bh
00404837 8b5704 mov edx,[edi+0x4]
0040483a 41 inc ecx
0040483b 46 inc esi
0040483c 3bf2 cmp esi,edx

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0cc17fa0 009b9b9b 00cccccc 00cccccc 00cccccc dreamseeker+0x482c
00ffffff 00000000 00000000 00000000 00000000 0x9b9b9b

*----> Raw Stack Dump <----*
000000000012ec54 10 5b fb 00 ac f2 19 02 - c0 95 47 01 00 00 00 00 .[........G.....
000000000012ec64 51 00 00 00 cb cb cb 00 - 00 01 00 00 a0 2e c1 0c Q...............
000000000012ec74 67 4c 40 00 30 dc 1b 00 - 10 5b fb 00 20 02 00 00 [email protected]....[.. ...
000000000012ec84 10 5b fb 00 94 52 40 00 - c0 95 47 01 00 00 b0 43 .[[email protected]
000000000012ec94 00 00 e0 42 88 bf ef 00 - 1c ee 12 00 a0 32 40 00 ...B.........2@.
000000000012eca4 b0 fd 12 00 00 00 00 00 - 1f 00 00 00 60 01 00 00 ............`...
000000000012ecb4 7c 00 00 00 54 41 dd 73 - 7c 00 00 00 a8 13 01 7a |...TA.s|......z
000000000012ecc4 00 00 00 00 f8 ec 12 00 - a0 32 40 00 20 02 00 00 .........2@. ...
000000000012ecd4 fe 13 4c 00 00 00 00 00 - 2c 9a 40 00 08 80 18 02 ..L.....,.@.....
000000000012ece4 92 05 00 00 b0 fd 12 00 - d4 86 ea 73 10 bf ef 00 ...........s....
000000000012ecf4 11 40 40 00 88 bf ef 00 - 08 80 18 02 92 05 00 00 .@@.............
000000000012ed04 10 bf ef 00 10 bf ef 00 - d4 86 ea 73 01 00 00 00 ...........s....
000000000012ed14 00 00 00 00 92 05 12 00 - 08 80 18 02 9c ed 12 00 ................
000000000012ed24 98 61 44 00 00 00 00 00 - 33 33 40 00 00 00 00 00 .aD.....33@.....
000000000012ed34 00 00 00 00 14 00 00 00 - 01 00 00 00 00 00 00 00 ................
000000000012ed44 00 00 00 00 c4 c6 e7 73 - a8 13 01 7a a8 13 01 7a .......s...z...z
000000000012ed54 00 00 00 00 e6 03 0c 00 - a8 13 01 7a 00 00 00 00 ...........z....
000000000012ed64 02 00 00 00 00 00 00 00 - 58 02 00 00 86 02 00 00 ........X.......
000000000012ed74 00 00 00 00 00 00 00 00 - 40 48 44 f7 d0 c9 e5 85 ........@HD.....
000000000012ed84 00 00 00 00 00 00 00 00 - ff ff ff ff 00 00 00 00 ................

*----> State Dump for Thread Id 0xfcc <----*

eax=00ecff2c ebx=00000000 ecx=00000000 edx=76b61770 esi=00000001 edi=00000002
eip=7c90e514 esp=00ecff08 ebp=00ecffb4 iopl=0 nv up ei ng nz ac po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000296

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00ecffb4 7c80b729 00000000 00000002 00000001 ntdll!KiFastSystemCallRet
00ecffec 00000000 76b5aeaf 00000000 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
0000000000ecff08 4a df 90 7c e9 ae b5 76 - 02 00 00 00 6c ff ec 00 J..|...v....l...
0000000000ecff18 01 00 00 00 01 00 00 00 - 00 00 00 00 01 00 00 00 ................
0000000000ecff28 20 00 dd 84 10 00 00 00 - e3 18 00 00 e3 18 00 00 ...............
0000000000ecff38 e3 18 00 00 f4 0f 00 00 - 16 0f 00 00 16 0f 00 00 ................
0000000000ecff48 ad 0c 00 00 ad 0c 00 00 - ad 0c 00 00 ad 0c 00 00 ................
0000000000ecff58 ad 0c 00 00 ad 0c 00 00 - ad 0c 00 00 df 0b 00 00 ................
0000000000ecff68 df 0b 00 00 70 00 00 00 - 7c 00 00 00 7c 02 00 00 ....p...|...|...
0000000000ecff78 7c 02 00 00 7c 02 00 00 - 80 02 00 00 88 02 00 00 |...|...........
0000000000ecff88 88 02 00 00 a4 02 00 00 - a4 02 00 00 a4 02 00 00 ................
0000000000ecff98 a4 02 00 00 a4 02 00 00 - a4 02 00 00 a4 02 00 00 ................
0000000000ecffa8 ac 02 00 00 ac 02 00 00 - 02 00 00 00 ec ff ec 00 ................
0000000000ecffb8 29 b7 80 7c 00 00 00 00 - 02 00 00 00 01 00 00 00 )..|............
0000000000ecffc8 00 00 00 00 00 e0 fd 7f - 00 46 fc 85 c0 ff ec 00 .........F......
0000000000ecffd8 a0 2f e0 85 ff ff ff ff - d8 9a 83 7c 30 b7 80 7c ./.........|0..|
0000000000ecffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 af ae b5 76 ...............v
0000000000ecfff8 00 00 00 00 00 00 00 00 - 08 00 00 00 00 01 00 01 ................
0000000000ed0008 ee ff ee ff 00 00 00 00 - 00 00 3e 00 00 00 00 00 ..........>.....
0000000000ed0018 00 00 ed 00 00 01 00 00 - 40 00 ed 00 00 00 fd 00 ........@.......
0000000000ed0028 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ed0038 d0 ff fc 00 00 00 00 00 - 33 20 08 00 24 01 0c 01 ........3 ..$...

*----> State Dump for Thread Id 0x568 <----*

eax=0015eb30 ebx=71ac40b4 ecx=0015eb46 edx=76f20000 esi=000000b8 edi=00000000
eip=7c90e514 esp=0126ff20 ebp=0126ff84 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WS2_32.dll -
ChildEBP RetAddr Args to Child
0126ff84 7c802542 000000b8 ffffffff 00000000 ntdll!KiFastSystemCallRet
0126ff98 71abd18c 000000b8 ffffffff 7c912d78 kernel32!WaitForSingleObject+0x12
0126ffb4 7c80b729 000000b8 7c912d78 7c916632 WS2_32!getnameinfo+0xb03
0126ffec 00000000 71abd161 0015e120 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
000000000126ff20 5a df 90 7c db 25 80 7c - b8 00 00 00 00 00 00 00 Z..|.%.|........
000000000126ff30 00 00 00 00 20 e1 15 00 - b8 f7 15 00 b4 40 ac 71 .... [email protected]
000000000126ff40 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000126ff50 10 00 00 00 48 00 00 00 - 7c ff 26 01 00 50 fd 7f ....H...|.&..P..
000000000126ff60 00 d0 fd 7f 00 00 00 00 - 03 00 00 00 34 ff 26 01 ............4.&.
000000000126ff70 20 e9 90 7c dc ff 26 01 - d8 9a 83 7c 08 26 80 7c ..|..&....|.&.|
000000000126ff80 00 00 00 00 98 ff 26 01 - 42 25 80 7c b8 00 00 00 ......&.B%.|....
000000000126ff90 ff ff ff ff 00 00 00 00 - b4 ff 26 01 8c d1 ab 71 ..........&....q
000000000126ffa0 b8 00 00 00 ff ff ff ff - 78 2d 91 7c 32 66 91 7c ........x-.|2f.|
000000000126ffb0 20 e1 15 00 ec ff 26 01 - 29 b7 80 7c b8 00 00 00 .....&.)..|....
000000000126ffc0 78 2d 91 7c 32 66 91 7c - 20 e1 15 00 00 d0 fd 7f x-.|2f.| .......
000000000126ffd0 00 46 fc 85 c0 ff 26 01 - a0 2f e0 85 ff ff ff ff .F....&../......
000000000126ffe0 d8 9a 83 7c 30 b7 80 7c - 00 00 00 00 00 00 00 00 ...|0..|........
000000000126fff0 00 00 00 00 61 d1 ab 71 - 20 e1 15 00 00 00 00 00 ....a..q .......
0000000001270000 c8 00 00 00 52 01 00 00 - ff ee ff ee 02 10 00 00 ....R...........
0000000001270010 00 00 00 00 00 fe 00 00 - 00 00 10 00 00 20 00 00 ............. ..
0000000001270020 00 02 00 00 00 20 00 00 - f8 00 00 00 ff ef fd 7f ..... ..........
0000000001270030 0a 00 08 06 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001270040 00 00 00 00 98 05 27 01 - 0f 00 00 00 f8 ff ff ff ......'.........
0000000001270050 50 00 27 01 50 00 27 01 - 40 06 27 01 00 00 00 00 P.'.P.'.@.'.....

*----> State Dump for Thread Id 0x984 <----*

eax=71ac25ce ebx=c0000000 ecx=000125cc edx=7e410000 esi=00000000 edi=71a8793c
eip=7c90e514 esp=0138ff7c ebp=0138ffb4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0138ffb4 7c80b729 71a67b03 0012eb38 7c90e920 ntdll!KiFastSystemCallRet
0138ffec 00000000 71a5d2c6 00163698 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
000000000138ff7c 4a da 90 7c 20 d3 a5 71 - 1c 01 00 00 bc ff 38 01 J..| ..q......8.
000000000138ff8c b0 ff 38 01 a4 ff 38 01 - 68 d3 a5 71 38 eb 12 00 ..8...8.h..q8...
000000000138ff9c 20 e9 90 7c 98 36 16 00 - 00 00 00 00 1c 00 00 00 ..|.6..........
000000000138ffac 00 00 a5 71 58 b0 22 00 - ec ff 38 01 29 b7 80 7c ...qX."...8.)..|
000000000138ffbc 03 7b a6 71 38 eb 12 00 - 20 e9 90 7c 98 36 16 00 .{.q8... ..|.6..
000000000138ffcc 00 c0 fd 7f 00 46 fc 85 - c0 ff 38 01 90 14 c8 85 .....F....8.....
000000000138ffdc ff ff ff ff d8 9a 83 7c - 30 b7 80 7c 00 00 00 00 .......|0..|....
000000000138ffec 00 00 00 00 00 00 00 00 - c6 d2 a5 71 98 36 16 00 ...........q.6..
000000000138fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000139000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000139001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000139002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000139003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000139004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000139005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000139006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000139007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000139008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000139009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000013900ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x110 <----*

eax=77df848a ebx=017ffed0 ecx=00000006 edx=00000000 esi=00000000 edi=7ffd5000
eip=7c90e514 esp=017ffea8 ebp=017fff44 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ADVAPI32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
017fff44 77df8631 00000002 017fff6c 00000000 ntdll!KiFastSystemCallRet
017fffb4 7c80b729 00000000 7c9142af 00000000 ADVAPI32!WmiFreeBuffer+0x24e
017fffec 00000000 77df848a 00000000 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
00000000017ffea8 4a df 90 7c 90 95 80 7c - 02 00 00 00 d0 fe 7f 01 J..|...|........
00000000017ffeb8 01 00 00 00 01 00 00 00 - 04 ff 7f 01 e8 3e 60 01 .............>`.
00000000017ffec8 60 66 e4 77 00 10 00 00 - f4 01 00 00 fc 01 00 00 `f.w............
00000000017ffed8 c0 fe 7f 01 ff ff ff ff - dc ff 7f 01 d8 9a 83 7c ...............|
00000000017ffee8 50 0b 81 7c 00 10 00 00 - 14 00 00 00 01 00 00 00 P..|............
00000000017ffef8 00 00 00 00 00 00 00 00 - 10 00 00 00 00 a2 2f 4d ............../M
00000000017fff08 ff ff ff ff 00 10 00 00 - 00 50 fd 7f 00 b0 fd 7f .........P......
00000000017fff18 dc ff 7f 01 04 ff 7f 01 - d0 fe 7f 01 06 00 00 00 ................
00000000017fff28 02 00 00 00 c4 fe 7f 01 - 06 00 00 00 dc ff 7f 01 ................
00000000017fff38 d8 9a 83 7c 80 96 80 7c - 00 00 00 00 b4 ff 7f 01 ...|...|........
00000000017fff48 31 86 df 77 02 00 00 00 - 6c ff 7f 01 00 00 00 00 1..w....l.......
00000000017fff58 e0 93 04 00 01 00 00 00 - af 42 91 7c 00 00 00 00 .........B.|....
00000000017fff68 00 00 00 00 f4 01 00 00 - fc 01 00 00 00 10 00 00 ................
00000000017fff78 e8 3e 60 01 00 00 00 00 - 00 10 00 00 e0 2e 60 01 .>`...........`.
00000000017fff88 e0 66 e4 77 78 00 00 00 - 00 67 e4 77 00 10 00 00 .f.wx....g.w....
00000000017fff98 00 00 00 00 e0 66 e4 77 - e8 3e 60 01 00 67 e4 77 .....f.w.>`..g.w
00000000017fffa8 e5 03 00 00 00 10 00 00 - e0 2e 60 01 ec ff 7f 01 ..........`.....
00000000017fffb8 29 b7 80 7c 00 00 00 00 - af 42 91 7c 00 00 00 00 )..|.....B.|....
00000000017fffc8 00 00 00 00 00 b0 fd 7f - 00 46 fc 85 c0 ff 7f 01 .........F......
00000000017fffd8 78 70 df 85 ff ff ff ff - d8 9a 83 7c 30 b7 80 7c xp.........|0..|

*----> State Dump for Thread Id 0x48c <----*

eax=00000000 ebx=00000000 ecx=0019c4d8 edx=ffffffff esi=0015f2b8 edi=0015f35c
eip=7c90e514 esp=01d4fe18 ebp=01d4ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01d4ff80 77e76caf 01d4ffa8 77e76ad1 0015f2b8 ntdll!KiFastSystemCallRet
01d4ff88 77e76ad1 0015f2b8 00000000 0012da38 RPCRT4!I_RpcBCacheFree+0x61c
01d4ffa8 77e76c97 00162a10 01d4ffec 7c80b729 RPCRT4!I_RpcBCacheFree+0x43e
01d4ffb4 7c80b729 0019c4d8 00000000 0012da38 RPCRT4!I_RpcBCacheFree+0x604
01d4ffec 00000000 77e76c7d 0019c4d8 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
0000000001d4fe18 aa da 90 7c e3 65 e7 77 - 40 02 00 00 74 ff d4 01 ...|[email protected]...
0000000001d4fe28 00 00 00 00 c0 ec 19 00 - 50 ff d4 01 28 fb 34 ef ........P...(.4.
0000000001d4fe38 9c 39 4e 80 68 ca 42 85 - 02 bf cc 85 00 00 00 00 .9N.h.B.........
0000000001d4fe48 06 02 00 00 9d b7 4d 80 - 02 00 00 00 de 39 4e 80 ......M......9N.
0000000001d4fe58 c0 5b a3 85 f8 93 27 85 - 20 bf cc 85 58 fb 34 ef .[....'. ...X.4.
0000000001d4fe68 8b 16 99 f7 5c 94 27 85 - 00 00 00 00 00 00 00 00 ....\.'.........
0000000001d4fe78 6c fb 34 ef 9f eb bd f4 - 58 94 27 85 00 00 00 00 l.4.....X.'.....
0000000001d4fe88 d0 ba cc 85 94 fb 34 ef - 2a 11 41 f7 e8 14 c7 85 ......4.*.A.....
0000000001d4fe98 f8 93 27 85 39 11 41 f7 - 00 bb cc 85 d0 ba cc 85 ..'.9.A.........
0000000001d4fea8 00 00 00 00 c0 5b a3 85 - 00 00 00 00 ac fb 34 ef .....[........4.
0000000001d4feb8 da 18 41 f7 fd 18 41 f7 - ac fb 34 ef 00 00 00 00 ..A...A...4.....
0000000001d4fec8 51 74 e0 f6 c8 fb 34 ef - 5d e9 e0 f6 00 4c e1 f6 Qt....4.]....L..
0000000001d4fed8 08 e0 bd 85 d0 f2 aa 85 - d0 8a e7 85 20 8f e7 85 ............ ...
0000000001d4fee8 f0 fb 34 ef 2a 11 41 f7 - 48 43 bd 85 08 e0 bd 85 ..4.*.A.HC......
0000000001d4fef8 39 11 41 f7 00 8b e7 85 - d0 8a e7 85 00 00 00 00 9.A.............
0000000001d4ff08 d0 f2 aa 85 00 00 00 00 - 08 fc 34 ef fc 37 0b 85 ..........4..7..
0000000001d4ff18 24 fc 34 ef b2 c2 4d 80 - ba c2 4d 80 cc 37 0b 85 $.4...M...M..7..
0000000001d4ff28 60 36 0b 85 80 ff d4 01 - ae df e7 77 48 ff d4 01 `6.........wH...
0000000001d4ff38 be df e7 77 e0 10 90 7c - 90 bb 19 00 d8 c4 19 00 ...w...|........
0000000001d4ff48 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0x55c <----*

eax=77e76c7d ebx=00000000 ecx=00000007 edx=00fac578 esi=0015f2b8 edi=0015f35c
eip=7c90e514 esp=030efe18 ebp=030eff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
030eff80 77e76caf 030effa8 77e76ad1 0015f2b8 ntdll!KiFastSystemCallRet
030eff88 77e76ad1 0015f2b8 00140510 00000000 RPCRT4!I_RpcBCacheFree+0x61c
030effa8 77e76c97 00162a10 030effec 7c80b729 RPCRT4!I_RpcBCacheFree+0x43e
030effb4 7c80b729 001690a0 00140510 00000000 RPCRT4!I_RpcBCacheFree+0x604
030effec 00000000 77e76c7d 001690a0 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
00000000030efe18 aa da 90 7c e3 65 e7 77 - 40 02 00 00 74 ff 0e 03 ...|[email protected]...
00000000030efe28 00 00 00 00 b0 87 1f 00 - 48 ff 0e 03 00 00 00 00 ........H.......
00000000030efe38 00 00 00 00 00 00 00 00 - 00 00 00 00 16 00 00 00 ................
00000000030efe48 ec ab b8 ef fe b6 4e 80 - fc 07 30 c0 ec ab b8 ef ......N...0.....
00000000030efe58 76 b5 4e 80 00 b0 fd 7f - 00 00 00 00 00 00 00 00 v.N.............
00000000030efe68 c8 ff f1 85 e0 59 a4 85 - 01 5a a4 85 00 00 00 00 .....Y...Z......
00000000030efe78 6c ff 1f c0 00 00 00 02 - 74 ab b8 ef 3d 0d 60 80 l.......t...=.`.
00000000030efe88 02 00 00 00 0c 00 00 00 - 20 5c 14 e1 00 00 00 00 ........ \......
00000000030efe98 00 00 00 00 48 7d 1e e1 - ec ab b8 ef 00 00 00 02 ....H}..........
00000000030efea8 14 ac b8 ef 0c dc 56 80 - 48 7d 1e e1 00 b0 fd 7f ......V.H}......
00000000030efeb8 fc 5b 14 e1 d8 b1 e1 e2 - 01 00 00 00 00 00 00 00 .[..............
00000000030efec8 14 ac b8 ef b8 b1 ad 85 - 01 00 00 00 30 b6 db 85 ............0...
00000000030efed8 01 00 00 00 50 20 ff 85 - 48 c6 29 e1 02 00 00 00 ....P ..H.).....
00000000030efee8 08 ac b8 ef 00 47 fc 85 - b8 b6 54 80 c8 ff f1 85 .....G....T.....
00000000030efef8 e0 59 a4 85 ac 5a a4 85 - 70 ff 1f c0 40 23 56 80 .Y...Z..p...@#V.
00000000030eff08 d8 78 a5 85 00 00 00 00 - 68 78 a5 85 cc 77 45 85 .x......hx...wE.
00000000030eff18 24 ac b8 ef b2 c2 4d 80 - ba c2 4d 80 9c 77 45 85 $.....M...M..wE.
00000000030eff28 30 76 45 85 80 ff 0e 03 - ae df e7 77 48 ff 0e 03 0vE........wH...
00000000030eff38 be df e7 77 e0 10 90 7c - 60 87 1f 00 a0 90 16 00 ...w...|`.......
00000000030eff48 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0xd04 <----*

eax=02421130 ebx=024201d0 ecx=000011ef edx=00000000 esi=000003b8 edi=00000000
eip=7c90e514 esp=0cdbff08 ebp=0cdbff6c iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293

function: ntdll!KiFastSystemCallRet
7c90e4fa e829000000 call ntdll!RtlRaiseException (7c90e528)
7c90e4ff 8b0424 mov eax,[esp]
7c90e502 8be5 mov esp,ebp
7c90e504 5d pop ebp
7c90e505 c3 ret
7c90e506 8da42400000000 lea esp,[esp]
7c90e50d 8d4900 lea ecx,[ecx]
ntdll!KiFastSystemCall:
7c90e510 8bd4 mov edx,esp
7c90e512 0f34 sysenter
ntdll!KiFastSystemCallRet:
7c90e514 c3 ret
7c90e515 8da42400000000 lea esp,[esp]
7c90e51c 8d642400 lea esp,[esp]
ntdll!KiIntSystemCall:
7c90e520 8d542408 lea edx,[esp+0x8]
7c90e524 cd2e int 2e
7c90e526 c3 ret
7c90e527 90 nop
ntdll!RtlRaiseException:
7c90e528 55 push ebp
7c90e529 8bec mov ebp,esp

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\mshtml.dll -
ChildEBP RetAddr Args to Child
0cdbff6c 7c802542 000003b8 000927c0 00000000 ntdll!KiFastSystemCallRet
0cdbff80 3cf4a7c1 000003b8 000927c0 3cea0000 kernel32!WaitForSingleObject+0x12
0cdbffa0 3ceb0788 00000000 3ceb084b 0239e068 mshtml!DllGetClassObject+0x8d37c
0cdbffb4 7c80b729 024201d0 00000000 0239e068 mshtml+0x10788
0cdbffec 00000000 3ceb083d 024201d0 00000000 kernel32!GetModuleFileNameA+0x1ba

*----> Raw Stack Dump <----*
000000000cdbff08 5a df 90 7c db 25 80 7c - b8 03 00 00 00 00 00 00 Z..|.%.|........
000000000cdbff18 3c ff db 0c 00 00 00 00 - 00 00 00 00 d0 01 42 02 <.............B.
000000000cdbff28 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000cdbff38 10 00 00 00 00 44 5f 9a - fe ff ff ff 00 50 fd 7f .....D_......P..
000000000cdbff48 00 90 fd 7f 3c ff db 0c - 00 00 00 00 1c ff db 0c ....<...........
000000000cdbff58 08 72 44 02 dc ff db 0c - d8 9a 83 7c 08 26 80 7c .rD........|.&.|
000000000cdbff68 00 00 00 00 80 ff db 0c - 42 25 80 7c b8 03 00 00 ........B%.|....
000000000cdbff78 c0 27 09 00 00 00 00 00 - a0 ff db 0c c1 a7 f4 3c .'.............<
000000000cdbff88 b8 03 00 00 c0 27 09 00 - 00 00 ea 3c d0 01 42 02 .....'.....<..B.
000000000cdbff98 d0 01 42 02 d0 01 42 02 - b4 ff db 0c 88 07 eb 3c ..B...B........<
000000000cdbffa8 00 00 00 00 4b 08 eb 3c - 68 e0 39 02 ec ff db 0c ....K..<h.9.....
000000000cdbffb8 29 b7 80 7c d0 01 42 02 - 00 00 00 00 68 e0 39 02 )..|..B.....h.9.
000000000cdbffc8 d0 01 42 02 00 90 fd 7f - 00 46 fc 85 c0 ff db 0c ..B......F......
000000000cdbffd8 38 14 bf 85 ff ff ff ff - d8 9a 83 7c 30 b7 80 7c 8..........|0..|
000000000cdbffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 3d 08 eb 3c ............=..<
000000000cdbfff8 d0 01 42 02 00 00 00 00 - 4d 5a 90 00 03 00 00 00 ..B.....MZ......
000000000cdc0008 04 00 00 00 ff ff 00 00 - b8 00 00 00 00 00 00 00 ................
000000000cdc0018 40 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 @...............
000000000cdc0028 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000cdc0038 00 00 00 00 b0 00 00 00 - 0e 1f ba 0e 00 b4 09 cd ................

Thank you for providing the crash log.

According to your crash information, the dreamseeker.exe you are using is from version 471. Your pager however believes it's 474. Apparently when you upgraded BYOND it did not properly install and the right files were not overwritten. You need to reinstall version 474 (or 475, due to be released shortly) from the download page.
Tried it and the crashes just keep on comming....