To reproduce:
-
open vvvv
-
open leaf menu
-
choose save as
-
pick a location
-
rename to something other than original CallMeNames***
-
select Just Save It
Exception log with detailed tech info. Generated on 15/05/2020 14:37:15.
You may send it to the application vendor, helping him to understand what had happened.
Application title: ÈÈÈÈ
Application file: D:_vvvv\vvvv_beta_40-0005_preview_x64\vvvv.exe
------------------------------------------------------------------------------
Exception class: EAccessViolation
Exception message: Access violation at address 000000000040E781 in module ‘vvvv.exe’. Read of address 0000000000000000.
Exception address: 000000000040E781
------------------------------------------------------------------------------
Main thread ID = 12388
Exception thread ID = 12388
------------------------------------------------------------------------------
Exception stack
Stack list, generated 15/05/2020 14:37:15
(000000000000D781){vvvv.exe } [000000000040E781]
[00007FF8EF30350E]{ntdll.dll } KiUserExceptionDispatcher
(000000000000D781){vvvv.exe } [000000000040E781]
(000000000000DCED){vvvv.exe } [000000000040ECED]
(0000000000574024){vvvv.exe } [0000000000975024]
(0000000000550D8C){vvvv.exe } [0000000000951D8C]
(000000000053D866){vvvv.exe } [000000000093E866]
(00000000005745A7){vvvv.exe } [00000000009755A7]
(00000000000DF916){vvvv.exe } [00000000004E0916]
(00000000000E0039){vvvv.exe } [00000000004E1039]
(000000000000A8D1){vvvv.exe } [000000000040B8D1]
(00000000000DF056){vvvv.exe } [00000000004E0056]
(00000000000DEB2F){vvvv.exe } [00000000004DFB2F]
(00000000000E5A19){vvvv.exe } [00000000004E6A19]
(00000000000E6231){vvvv.exe } [00000000004E7231]
(00000000000E56A9){vvvv.exe } [00000000004E66A9]
(000000000008AE16){vvvv.exe } [000000000048BE16]
[00007FF8EE2A74D6]{USER32.dll } Unknown function at DispatchMessageW
[00007FF8EE2A6FF2]{USER32.dll } Unknown function at DispatchMessageW
(00000000001C5804){vvvv.exe } [00000000005C6804]
(00000000001C5878){vvvv.exe } [00000000005C6878]
(00000000001C5D74){vvvv.exe } [00000000005C6D74]
(00000000009DC9AC){vvvv.exe } [0000000000DDD9AC]
[00007FF8EC517974]{KERNEL32.DLL} BaseThreadInitThunk
[00007FF8EF2CA271]{ntdll.dll } RtlUserThreadStart
------------------------------------------------------------------------------
Call stack for main thread
Stack list, generated 15/05/2020 14:37:15
[00007FF8EF3014D4]{ntdll.dll } ZwGetContextThread
(00000000000E6438){vvvv.exe } [00000000004E7438]
(00000000001B78C0){vvvv.exe } [00000000005B88C0]
(00000000000E56A9){vvvv.exe } [00000000004E66A9]
(000000000008AE16){vvvv.exe } [000000000048BE16]
[00007FF8EE2A74D6]{USER32.dll } Unknown function at DispatchMessageW
[00007FF8EE2A6FF2]{USER32.dll } Unknown function at DispatchMessageW
(00000000001C5804){vvvv.exe } [00000000005C6804]
(00000000001C5878){vvvv.exe } [00000000005C6878]
(00000000001BE94D){vvvv.exe } [00000000005BF94D]
(000000000056F509){vvvv.exe } [0000000000970509]
(000000000056E648){vvvv.exe } [000000000096F648]
(00000000001C5F3B){vvvv.exe } [00000000005C6F3B]
(00000000000E56CB){vvvv.exe } [00000000004E66CB]
(000000000008AE16){vvvv.exe } [000000000048BE16]
[00007FF8EE2A74D6]{USER32.dll } Unknown function at DispatchMessageW
[00007FF8EE2A6FF2]{USER32.dll } Unknown function at DispatchMessageW
(00000000001C5804){vvvv.exe } [00000000005C6804]
(00000000001C5878){vvvv.exe } [00000000005C6878]
(00000000001C5D74){vvvv.exe } [00000000005C6D74]
(00000000009DC9AC){vvvv.exe } [0000000000DDD9AC]
[00007FF8EC517974]{KERNEL32.DLL} BaseThreadInitThunk
[00007FF8EF2CA271]{ntdll.dll } RtlUserThreadStart