Qiu233 / QTRHacker

A powerful hack for Terraria
GNU General Public License v3.0
148 stars 32 forks source link

A 32 bit process cannot access modules of a 64 bit process. #50

Open DylanVN23607 opened 10 months ago

DylanVN23607 commented 10 months ago

[11/4/2023 8:29:55 PM][INFO] Hack Version: 13.0.0.0-1.4.4.9 [11/4/2023 8:29:55 PM][INFO] OS: Microsoft Windows NT 10.0.19041.0 [11/4/2023 8:29:55 PM][INFO] OS is X64: True [11/4/2023 8:30:29 PM][INFO] Cross released at (966,231), pid = 11340, name = dotnet [11/4/2023 8:30:29 PM][ERROR] Unhandled exception from : IsTerminating: True [11/4/2023 8:30:30 PM][ERROR] (0): A 32 bit processes cannot access modules of a 64 bit process. at System.Diagnostics.NtProcessManager.GetModules(Int32 processId, Boolean firstModuleOnly) at System.Diagnostics.Process.get_Modules() at QTRHacker.ViewModels.PagePanels.MainPageViewModel.InternalInit(Point p) at QTRHacker.ViewModels.PagePanels.MainPageViewModel.<>cDisplayClass35_0.b0() at System.Threading.Tasks.Task`1.InnerInvoke() at System.Threading.Tasks.Task.<>c.<.cctor>b273_0(Object obj) at System.Threading.ExecutionContext.RunFromThreadPoolDispatchLoop(Thread threadPoolThread, ExecutionContext executionContext, ContextCallback callback, Object state) --- End of stack trace from previous location --- at System.Threading.ExecutionContext.RunFromThreadPoolDispatchLoop(Thread threadPoolThread, ExecutionContext executionContext, ContextCallback callback, Object state) at System.Threading.Tasks.Task.ExecuteWithThreadLocal(Task& currentTaskSlot, Thread threadPoolThread) --- End of stack trace from previous location --- at QTRHacker.ViewModels.PagePanels.MainPageViewModel.InitGame(Point p) at System.Threading.Tasks.Task.<>c.b128_0(Object state) at System.Windows.Threading.ExceptionWrapper.InternalRealCall(Delegate callback, Object args, Int32 numArgs) at System.Windows.Threading.ExceptionWrapper.TryCatchWhen(Object source, Delegate callback, Object args, Int32 numArgs, Delegate catchHandler) at System.Windows.Threading.DispatcherOperation.InvokeImpl() at System.Windows.Threading.DispatcherOperation.InvokeInSecurityContext(Object state) at MS.Internal.CulturePreservingExecutionContext.CallbackWrapper(Object obj) at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state) --- End of stack trace from previous location --- at System.Threading.ExecutionContext.RunInternal(ExecutionContext executionContext, ContextCallback callback, Object state) at MS.Internal.CulturePreservingExecutionContext.Run(CulturePreservingExecutionContext executionContext, ContextCallback callback, Object state) at System.Windows.Threading.DispatcherOperation.Invoke() at System.Windows.Threading.Dispatcher.ProcessQueue() at System.Windows.Threading.Dispatcher.WndProcHook(IntPtr hwnd, Int32 msg, IntPtr wParam, IntPtr lParam, Boolean& handled) at MS.Win32.HwndWrapper.WndProc(IntPtr hwnd, Int32 msg, IntPtr wParam, IntPtr lParam, Boolean& handled) at MS.Win32.HwndSubclass.DispatcherCallbackOperation(Object o) at System.Windows.Threading.ExceptionWrapper.InternalRealCall(Delegate callback, Object args, Int32 numArgs) at System.Windows.Threading.ExceptionWrapper.TryCatchWhen(Object source, Delegate callback, Object args, Int32 numArgs, Delegate catchHandler) at System.Windows.Threading.Dispatcher.LegacyInvokeImpl(DispatcherPriority priority, TimeSpan timeout, Delegate method, Object args, Int32 numArgs) at MS.Win32.HwndSubclass.SubclassWndProc(IntPtr hwnd, Int32 msg, IntPtr wParam, IntPtr lParam) at MS.Win32.UnsafeNativeMethods.DispatchMessage(MSG& msg) at System.Windows.Threading.Dispatcher.PushFrameImpl(DispatcherFrame frame) at System.Windows.Threading.Dispatcher.PushFrame(DispatcherFrame frame) at System.Windows.Threading.Dispatcher.Run() at System.Windows.Application.RunDispatcher(Object ignore) at System.Windows.Application.RunInternal(Window window) at System.Windows.Application.Run() at QTRHacker.UI.App.Main()