Here is a stack trace from Visual Studio (collected by attaching the debugger to running process):
``` 0xC0000005: Access violating when writing at position 0xFFFFFFFFA05CB32C.
ntdll.dll!LdrpAllocateTlsEntry() ntdll.dll!LdrpHandleTlsData() ntdll.dll!LdrpDoPostSnapWork() ntdll.dll!LdrpSnapModule() ntdll.dll!LdrpMapAndSnapDependency() ntdll.dll!LdrpMapDllWithSectionHandle() ntdll.dll!LdrpMapDllNtFileName() ntdll.dll!LdrpMapDllRetry() ntdll.dll!LdrpProcessWork() ntdll.dll!LdrpDrainWorkQueue() ntdll.dll!LdrpLoadDllInternal() ntdll.dll!LdrpLoadDll() ntdll.dll!LdrLoadDll() KernelBase.dll!LoadLibraryExW() KernelBase.dll!LoadLibraryExA() KernelBase.dll!LoadLibraryA() Squeak.exe!00000000004aa129() Squeak.exe!00000000004b8cd7() Squeak.exe!00000000004b9062() Squeak.exe!000000000041c642() Squeak.exe!0000000000407926() Squeak.exe!0000000000411c9e() Squeak.exe!0000000000401d3c() Squeak.exe!00000000004aea6b() Squeak.exe!00000000004aed8f() Squeak.exe!00000000004013c7() Squeak.exe!00000000004014cb() kernel32.dll!BaseThreadInitThunk() ntdll.dll!RtlUserThreadStart() ```
Is this helpful in any way? :-)