ntvdmx64 icon indicating copy to clipboard operation
ntvdmx64 copied to clipboard

Windows 11, trying to open app, opens and closes rigtht away

Open Chet303 opened this issue 3 years ago • 31 comments

autobuild-ccpu-fre and debug versions win 11 build 22000 Windows 10 works fine, on windows 11 every time I try to open a Dos app, opens and closes right away. Anything I can try to fix this issue? Tried uninstalling/reinstalling, real time protections off Thanks

Chet303 avatar Jan 30 '22 18:01 Chet303

Was able to make the program open by changing the font to Raster which is too small for me to use. By changing the font to LUCIDA CONSOLE (preferred) the window opens and closes right away, same result with Consolas font. Is there any way to use the LUCIDA font for the DOS text app? Stuck with the program only working with Raster Fonts.

Never had this issue in win10.

Chet303 avatar Jan 30 '22 18:01 Chet303

This sounds like a severe bug in Windows 11 console that got addressed by the loader in https://github.com/leecher1337/ntvdmx64/commit/929c8533231ce968732a14423c2d48e1bdb4bfe3

I'm pretty annoyed that I always have to fix Microsoft's bugs in my loader. grr I guess, you are using the latest Win11 loader? I tested my Windows bugfix with Build 22000.318 and it works there. Maybe these morons messed up something again in later updates?

leecher1337 avatar Jan 30 '22 18:01 leecher1337

Upgraded my win10 box today to 11 and now on OS 22000.434build . Does that mean the loader needs to be fixed, or is there another way around this issue.

Chet303 avatar Jan 30 '22 20:01 Chet303

Hm, if you upgraded Windows, did you reinstall NTVDMx64 so that Win 11 loader gets installed and not Win10 loader? I guess so, because Win 10 loader wouldn't work with Win 11 anyway, but you can verify (compare loader DLLs in system32 and syswow64 directory):

These are the correct loader DLLs for Win 11 that contain the bugfix and work on 22000.318 (haven't tested 22000.434 yet): https://github.com/leecher1337/ntvdmx64/tree/master/ntvdmpatch/release/ldntvdm/system32/11.0 https://github.com/leecher1337/ntvdmx64/blob/master/ntvdmpatch/release/ldntvdm/syswow64/11.0

leecher1337 avatar Jan 30 '22 21:01 leecher1337

Tried on 22000.434 with patched files, same issue. System prompted for an update, now on 22000.469, tried again, with patched files above, same issue. Any other workarounds?

Chet303 avatar Jan 31 '22 01:01 Chet303

Updated to 22000.469 now. Found a little loader bug while updating, but not related to your issue. Still no font problems with 22000.469. You can try to remove contents of HKEY_LOCAL_MACHINE\SOFTWARE\ldntvdm key (DON'T delete the key itself, otherwise it will get recreated, most likely with wrong permissions!). That would clean out the symbol cache in case conhostV1 symbols needed for bugfix are wrong. You can also check dbgView output if there are problems resolving ConHost symbols required for bugfix (conhostV1.dll/InitializeCustomCP needs to get resolved properly). If there are bugfix installation problems, these may get written to console, see https://github.com/leecher1337/ntvdmx64/blob/master/ntvdmpatch/src/ldntvdm/ldntvdm/oemcp.c for possible errors to watch for.

leecher1337 avatar Feb 01 '22 00:02 leecher1337

Thanks for looking into this. Removed everything in the ldntvdm key, still not able to use no other font but raster, cmd just opens and closes.

I'm not versed in finding bugs in pgms. Tried to capture dbgview output when the app opens and closes. Not sure if you can make anything of it or not or if captured properly.

00000001 0.00000000 [6468] NtCreateUserProcess(ThreadHandle=0, CommandLine="C:\Users\chet303.domain\Desktop\shortcuts\Shortcut.pif" ) failed with C000012F 00000002 0.00002330 [6468] LDNTVDM: BasepProcessInvalidImage(C000012F,'??\C:\Users\chet303.domain\Desktop\shortcuts\Shortcut.pif'); 00000003 0.00091200 [6468] VDMState=00000001 00000004 0.00091850 [6468] LDNTVDM: Launch DOS! 00000005 0.00200280 [6468] Injecting into WOW64 Process? 1 00000006 0.00212190 [6468] Hook_Inline(77daf5d0, e0000, code) 00000007 0.00213400 [6468] dwOrigSize detected: 10 00000008 0.00267840 [6468] About to alloc page @77cff000 00000009 0.00270930 [6468] Hook_Inline context=77cf0000 00000010 0.00273780 [6468] Hook_Inline(7ffbc28de1ac, f0000, code) 00000011 0.00274760 [6468] dwOrigSize detected: 10 00000012 0.00335830 [6468] About to alloc page @7ffbc27ff000 00000013 0.00338370 [6468] Hook_Inline context=7ffbc27f0000 00000014 0.00340300 [6468] APPCERT_IMAGE_OK_TO_RUN 00000015 0.00341000 [6468] APPCERT_CREATION_ALLOWED 00000016 0.04268080 [8232] LDNTVDM is running inside ntvdm.exe 00000017 0.04270930 [8232] Hook_IAT_x64(778A0000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 6F763FF0) 00000018 0.04272330 [8232] Hooked 777E5CE0 -> 6F763FF0 00000019 0.04273640 [8232] LDNTVDM: BasepProcessInvalidImageReal = 777E5CE0 00000020 0.04274750 [8232] LDNTVDM: BaseIsDosApplication = 7780A490 00000021 0.04275990 [8232] Hook_IAT_x64_IAT(778A0000, ntdll.dll, NtCreateUserProcess, 6F763F20, 6F7706C0) 00000022 0.04279080 [8232] Hooked 77D75700 -> 6F763F20 00000023 0.04281300 [8232] Hook_IAT_x64_IAT(777B0000, ntdll.dll, CsrClientCallServer, 6F762690, 6F76B000) 00000024 0.04283130 [8232] Hooked 77DC24A0 -> 6F762690 00000025 0.04292440 [8232] Hook_IAT_x64_IAT(777B0000, ntdll.dll, CsrAllocateMessagePointer, 6F762800, 00000000) 00000026 0.04299320 [8232] Hooked 77DC2360 -> 6F762800 00000027 0.04304240 [8232] Hook_IAT_x64_IAT(F000000, KERNEL32.DLL, SetConsolePalette, 6F761160, 6F7706D4) 00000028 0.04307950 [8232] Hooked 778128B0 -> 6F761160 00000029 0.04311570 [8232] Hook_IAT_x64_IAT(777B0000, ntdll.dll, NtQueryInformationProcess, 6F761080, 00000000) 00000030 0.04317190 [8232] Hooked 77D74BA0 -> 6F761080 00000031 0.04320340 [8232] Hook_IAT_x64_IAT(778A0000, ntdll.dll, NtQueryInformationProcess, 6F761080, 00000000) 00000032 0.04325270 [8232] Hooked 77D74BA0 -> 6F761080 00000033 0.04330470 [8232] Hook_Inline(76e48ab0, 6f763590, PrivateExtractIconsWHook) 00000034 0.04333840 [8232] Hook_Inline did hotpatch -> context=76e48ab2 00000035 0.04336230 [8232] Hook_IAT_x64_IAT(76E10000, api-ms-win-core-file-l1-2-1.dll, ReadFile, 6F763510, 6F7706D0) 00000036 0.04338740 [8232] Hooking failed (-1) 00000037 0.04339860 [8232] Hook_IAT_x64_IAT(76E10000, api-ms-win-core-file-l1-1-0.dll, ReadFile, 6F763510, 6F7706D0) 00000038 0.04340710 [8232] Hooked 779C0130 -> 6F763510 00000039 0.07670030 [8232] Process has child with PID 16380 00000040 0.07677220 [8232] Want to inject into child (conhost=1, proc=C:\Windows\System32\conhost.exe) 00000041 0.07679150 [8232] Injecting into WOW64 Process? 0 00000042 0.07692820 [8232] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64) 00000043 0.07729160 [16380] LDNTVDM is running inside conhost.exe 00000044 0.07732140 [16380] Hook_IAT_x64(BFF70000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, BE6745CC) 00000045 0.07733520 [16380] Hooked C18C70E0 -> BE6745CC 00000046 0.07734170 [16380] LDNTVDM: BasepProcessInvalidImageReal = C18C70E0 00000047 0.07734930 [16380] LDNTVDM: BaseIsDosApplication = C18EE9E0 00000048 0.07735670 [16380] Hook_IAT_x64_IAT(BFF70000, ntdll.dll, NtCreateUserProcess, BE6743CC, BE6828C0) 00000049 0.07738240 [16380] Hooked C28A50D0 -> BE6743CC 00000050 0.07738710 [16380] LDNTVDM is running inside ConHost.exe 00000051 0.07746470 [16380] ShouldUseConhostV2 hook installed @BF866850 00000052 0.07747510 [16380] Hook_IAT_x64_IAT(87590000, ntdll.dll, RtlAllocateHeap, BE671304, BE6828F8) 00000053 0.07749910 [8232] BaseGetNextVDMCommand: ConsoleHandle=00003FFC, iTask=00000007 00000054 0.07751640 [16380] Hooked C2828AC0 -> BE671304 00000055 0.07754320 [8232] BaseGetNextVDMCommand(268500999) = 00000000 00000056 0.07764930 [16380] Hook_Inline(7ffbc1b4f9c0, 7ffbbe672b94, PrivateExtractIconsWHook) 00000057 0.07769860 [16380] dwOrigSize detected: 7 00000058 0.07775360 [8232] NTVDM: 18432K Memory: 1024K XMS, 0K EMS, 16384K DPMI 00000059 0.07776940 [16380] Hook_Inline context=7ffbc1bc4e76 00000060 0.07778490 [16380] Hook_IAT_x64_IAT(C1B30000, api-ms-win-core-file-l1-2-1.dll, ReadFile, BE672AB0, BE6828E8) 00000061 0.07779330 [16380] Hooking failed (-1) 00000062 0.07780190 [16380] Hook_IAT_x64_IAT(C1B30000, api-ms-win-core-file-l1-1-0.dll, ReadFile, BE672AB0, BE6828E8) 00000063 0.07781180 [16380] Hooked BFFA4420 -> BE672AB0 00000064 0.07976330 [8232] BaseIsFirstVDM(65545) = C0000022 00000065 0.08006070 [8232] YODA debug event handler installed 00000066 0.08067470 [8232] Loading [C:\WINDOWS\system32\ntio.sys] 00000067 0.08068730 [8232] VDM ModLoad: C:\WINDOWS\system32\ntio.sys => segment 8e05, len=8430 00000068 0.08072060 [8232] VDM SegMove: C:\WINDOWS\system32\ntio.sys (1) 8e05 => 70, len = 8430 00000069 0.08361330 [8232] VDM SegMove: C:\WINDOWS\system32\ntdos.sys (2) 9386 => a7, len = 8f29 00000070 0.08928200 [8232] Loading [C:\WINDOWS\SYSTEM32\HIMEM.SYS] 00000071 0.08936900 [8232] VDM ModLoad: C:\WINDOWS\SYSTEM32\HIMEM.SYS => segment 0, len=12a0 00000072 0.08996150 [8232] VDM SegMove: C:\WINDOWS\system32\ntdos.sys (1) 9386 => fe2e, len = 793f 00000073 0.09228810 [8232] Loading [C:\WINDOWS\SYSTEM32\COMMAND.COM] 00000074 0.09230000 [8232] VDM ModLoad: C:\WINDOWS\SYSTEM32\COMMAND.COM => segment 410, len=c5bc 00000075 0.10043860 [8232] Loading [C:\WINDOWS\system32\MSCDEXNT.EXE] 00000076 0.10045840 [8232] VDM ModLoad: C:\WINDOWS\system32\MSCDEXNT.EXE => segment c898, len=200 00000077 0.10276500 [8232] Loading [C:\WINDOWS\system32\REDIR.EXE] 00000078 0.10278150 [8232] VDM ModLoad: C:\WINDOWS\system32\REDIR.EXE => segment c8af, len=1400 00000079 0.10509880 [8232] Loading [C:\WINDOWS\system32\DOSX.EXE] 00000080 0.10511630 [8232] VDM ModLoad: C:\WINDOWS\system32\DOSX.EXE => segment c9d4, len=de00 00000081 0.10638460 [8232] VDM SegLoad: C:\WINDOWS\system32\DOSX.EXE(0) Data => b7 00000082 0.10640660 [8232] VDM SegLoad: C:\WINDOWS\system32\DOSX.EXE(2) Code => cf 00000083 0.10642730 [8232] VDM SegLoad: C:\WINDOWS\system32\DOSX.EXE(3) Code => c7 00000084 0.10941020 [8232] BaseGetNextVDMCommand: ConsoleHandle=00003FFC, iTask=00000000 00000085 0.10946020 [8232] BaseGetNextVDMCommand(268500999) = 00000000 00000086 0.12741619 [16380] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64) 00000087 0.48980349 [12924] LDNTVDM is running inside WerFault.exe 00000088 0.48981911 [12924] Hook_IAT_x64(BFF70000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, BE6745CC) 00000089 0.48985159 [12924] Hooked C18C70E0 -> BE6745CC 00000090 0.48991421 [12924] LDNTVDM: BasepProcessInvalidImageReal = C18C70E0 00000091 0.48992190 [12924] LDNTVDM: BaseIsDosApplication = C18EE9E0 00000092 0.48997909 [12924] Hook_IAT_x64_IAT(BFF70000, ntdll.dll, NtCreateUserProcess, BE6743CC, BE6828C0) 00000093 0.48998570 [12924] Hooked C28A50D0 -> BE6743CC 00000094 0.51846367 [12924] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64) 00000095 78.78274536 [18400] PrivateExtractIconsWHook(c:\windows\system32\imageres.dll)

Chet303 avatar Feb 01 '22 01:02 Chet303

Log looks OK to me, please try attached version of ldntvdm.dll in System32 directory (rename ldntvdm.dll to ldntvdm.dll.bak and copy new ldntvdm.dll there, then reboot) and redo DbgView recording, it should output some more information about NLS table initialization. ldntvdm.zip

leecher1337 avatar Feb 01 '22 02:02 leecher1337

Trying with Windows 11 10.0.22000.434, I rebuilt reinstalled and rebooted. Now when I try to start it I get a box headed '16 bit MS-DOS Subsystem' with text: NTVDM has encountered a System Error. No process is on the other end of the pipe. Choose 'Close' to terminate the application

dominicraf avatar Feb 01 '22 10:02 dominicraf

@dominicraf So same issue as described in this thread? So, changing font "cures" conhost crash? Have you tried ldntvdm attached in my previous post, which contains more logging regarding the Win11 NLS conhost bug. If so, please paste DbgView output.

leecher1337 avatar Feb 01 '22 12:02 leecher1337

I had not previously touched the fonts at all - I am using Consolas (but see below). Also I just did an advised upgrade so now I am on Windows 11 v10.0.22000.469.

I installed Dbgview and your ldntvdm.dll and I give below the output (I have tried to leave out a lot of stuff that looked irrelevant) - comments continue below.

00000001	0.00000000	[16400] LDNTVDM is running inside MoNotificationUx.exe	
00000002	0.00003750	[16400] Hook_IAT_x64(0CA60000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 0B2B453C)	
00000003	0.00007020	[16400] Hooked 0E0A70E0 -> 0B2B453C	
00000004	0.00008710	[16400] LDNTVDM: BasepProcessInvalidImageReal = 0E0A70E0	
00000005	0.00010320	[16400] LDNTVDM: BaseIsDosApplication = 0E0CE9E0	
00000006	0.00012200	[16400] Hook_IAT_x64_IAT(CA60000, ntdll.dll, NtCreateUserProcess, 0B2B43FC, 0B2C2950)	
00000007	0.00015460	[16400] Hooked 0F3850D0 -> 0B2B43FC	
00000008	0.00017770	[16400] Hook_Inline(7ffd0d43f9c0, 7ffd0b2b2b94, PrivateExtractIconsWHook)	
00000009	0.00019680	[16400] dwOrigSize detected: 7	
00000010	0.00022820	[16400] Hook_Inline context=7ffd0d4b4e76	
00000011	0.00024340	[16400] Hook_IAT_x64_IAT(D420000, api-ms-win-core-file-l1-2-1.dll, ReadFile, 0B2B2AB0, 0B2C2978)	
00000012	0.00026000	[16400] Hooking failed (-1)	
00000013	0.00027590	[16400] Hook_IAT_x64_IAT(D420000, api-ms-win-core-file-l1-1-0.dll, ReadFile, 0B2B2AB0, 0B2C2978)	
00000014	0.00029320	[16400] Hooked 0CA94420 -> 0B2B2AB0	
00000015	0.04615560	[16400] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000016	0.06686960	[16400] Populating UpdatePolicy AllowList	
00000017	0.06707520	[16400] SKU MDM licensing allow list string from SLAPI:	
00000018	0.06709580	[16400] AboveLock|Accounts|ActiveXControls|ADMXIngest|AllowMessageSync|AppHVSI|ApplicationDefaults|AllowAllTrustedApps|AllowAppStoreAutoUpdate|AllowAutomaticAppArchiving|AllowDeveloperUnlock|AllowGameDVR|AllowSharedUserAppData|ApplicationRestrictions|Audit|ConfigureChatIcon|LaunchAppAfterLogOn|MSIAllowUserControlOverInstall|MSIAlwaysInstallWithElevatedPrivileges|RestrictAppDataToSystemVolume|RestrictAppToSystemVolume|AppRuntime|AttachmentManager|Authentication|Autoplay|BitLocker|BITS|Bluetooth|Browser|Camera|Cellular|Connectivity|ControlPolicyConflict|CredentialProviders|CredentialsDelegation|CredentialsUI|Cryptography|DataProtection|DataUsage|Defender|DeliveryOptimization|Desktop|ConfigureSystemGuardLaunch|EnableVirtualizationBasedSecurity|DeviceHealthMonitoring|DeviceInstallation|DeviceLock|Display|DmaGuard|ErrorReporting|Eap|Education|EnterpriseCloudPrint|EventLogService|AllowClipboardHistory|AllowCopyPaste|AllowCortana|AllowDeviceDiscovery|AllowManualMDMUnenrollment|AllowSaveAsOfOfficeFiles|AllowScreenCapture|AllowSharingOfOfficeFiles|AllowSIMErrorDialogPromptWhenNoSIM|AllowSyncMySettings|AllowTailoredExperiencesWithDiagnosticData|AllowTaskSwitcher|AllowThirdPartySuggestionsInWindowsSpotlight|AllowVoiceRecording|DoNotShowFeedbackNotifications|DoNotSyncBrowserSettings|AllowFindMyDevice|ExploitGuard|Feeds|FileExplorer|Games|Handwriting|HumanPresence|InternetExplorer|Kerberos|KioskBrowser|Knobs|LanmanWorkstation|Licensing|LocalPoliciesSecurityOptions|LocalUsersAndGroups|Lockdown|Maps|MemoryDump|MSSecurityGuide|MSSLegacy|Multitasking|NetworkIsolation|NetworkListManager|NewsAndInterests|Notifications|OneDrive|Power|Printers|Privacy|RemoteAssistance|RemoteDesktopServices|RemoteDesktop|RemoteManagement|RemoteProcedureCall|RemoteShell|RestrictedGroups|Search|Security|Settings|SmartScreen|Speech|Start|Storage|System|SystemServices|TaskManager|TaskScheduler|TenantRestrictions|TextInput|TimeLanguageSettings|Troubleshooting|Update|UserRights|VirtualizationBasedTechnology|WiFi|WindowsLogon|WirelessDisplay|Location|WindowsAutopilot|WindowsConnectionManager|WindowsDefenderSecurityCenter|WindowsInkWorkspace|WindowsPowerShell|WindowsSandbox|WiredNetwork	
00000019	0.06711130	[16400] 	
00000020	0.06716130	[16400] All policies are allowed	
00000021	0.11091090	[6620] [AURA HAL][ENE DRAM] Sunc (1,0,5)	
00000022	0.11096370	[6620] AURACtrl::Sync	
...
00000189	2.74267030	[10688] Injecting into WOW64 Process? 0	
00000190	2.74270368	[10688] Hook_Inline(7ffd0f3be1ac, 1738fa40000, code)	
00000191	2.74272490	[10688] dwOrigSize detected: 10	
00000192	2.74343920	[10688] About to alloc page @7ffd0f2df000	
00000193	2.74349165	[10688] Hook_Inline context=7ffd0f2d0000	
00000194	2.74353480	[10688] APPCERT_IMAGE_OK_TO_RUN	
00000195	2.74355149	[10688] APPCERT_CREATION_ALLOWED	
00000196	2.78183198	[16544] LDNTVDM is running inside cmd.exe	
00000197	2.78190970	[16544] Hook_IAT_x64(0CA60000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 0B2B453C)	
00000198	2.78193212	[16544] Hooked 0E0A70E0 -> 0B2B453C	
00000199	2.78194594	[16544] LDNTVDM: BasepProcessInvalidImageReal = 0E0A70E0	
00000200	2.78196812	[16544] LDNTVDM: BaseIsDosApplication = 0E0CE9E0	
00000201	2.78197932	[16544] Hook_IAT_x64_IAT(CA60000, ntdll.dll, NtCreateUserProcess, 0B2B43FC, 0B2C2950)	
00000202	2.78201389	[16544] Hooked 0F3850D0 -> 0B2B43FC	
00000203	2.83217931	[16544] Process has child with PID 16552	
00000204	2.83228207	[16544] Want to inject into child (conhost=1, proc=C:\Windows\System32\conhost.exe)	
00000205	2.83230829	[16544] Injecting into WOW64 Process? 0	
00000206	2.83245850	[16544] Created injection thread h=00000090, tid=7852	
00000207	2.83323002	[16552] LDNTVDM is running inside conhost.exe	
00000208	2.83329320	[16552] Hook_IAT_x64(0CA60000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 0B2B453C)	
00000209	2.83331609	[16552] Hooked 0E0A70E0 -> 0B2B453C	
00000210	2.83333468	[16552] LDNTVDM: BasepProcessInvalidImageReal = 0E0A70E0	
00000211	2.83335161	[16552] LDNTVDM: BaseIsDosApplication = 0E0CE9E0	
00000212	2.83336949	[16552] Hook_IAT_x64_IAT(CA60000, ntdll.dll, NtCreateUserProcess, 0B2B43FC, 0B2C2950)	
00000213	2.83340526	[16552] Hooked 0F3850D0 -> 0B2B43FC	
00000214	2.83342409	[16552] LDNTVDM is running inside ConHost.exe	
00000215	2.83356881	[16552] Hook_IAT_x64_IAT(C5510000, ntdll.dll, RtlAllocateHeap, 0B2B1304, 0B2C2988)	
00000216	2.83359361	[16552] Hooked 0F308AC0 -> 0B2B1304	
00000217	2.83361602	[16552] OEMCP_FixNLSTable enter	
00000218	2.83372474	[16552] Peb->OemCodePageData set to CCA70000	
00000219	2.83374619	[16552] OEMCP_CallInitializeCustomCP	
00000220	2.83385611	[16552] failed: nt=C5510000, fnInitializeCustomCP=0	
00000221	2.83388114	[16552] Hook_Inline(7ffd0d43f9c0, 7ffd0b2b2b94, PrivateExtractIconsWHook)	
00000222	2.83390236	[16552] dwOrigSize detected: 7	
00000223	2.83393216	[16552] Hook_Inline context=7ffd0d4b4e76	
00000224	2.83395004	[16552] Hook_IAT_x64_IAT(D420000, api-ms-win-core-file-l1-2-1.dll, ReadFile, 0B2B2AB0, 0B2C2978)	
00000225	2.83396840	[16552] Hooking failed (-1)	
00000226	2.83398485	[16552] Hook_IAT_x64_IAT(D420000, api-ms-win-core-file-l1-1-0.dll, ReadFile, 0B2B2AB0, 0B2C2978)	
00000227	2.83400559	[16552] Hooked 0CA94420 -> 0B2B2AB0	
00000228	2.88217711	[16552] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000229	2.88225985	[16544] RtlCreateUserThread Status = 00000000	
00000230	2.88232470	[16544] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000231	2.90196729	[16544] UpdateSymbolCache()	
00000232	2.90280604	[16544] Symsrv options: 00000002	
00000233	2.90284705	[16544] DBGHELP: Symbol Search Path: SRV*C:\WINDOWS\Symbols*C:\Users\Dominic\AppData\Local\Temp\SymbolCache*http://msdl.microsoft.com/download/symbols 	
00000234	2.90287971	[16544] DBGHELP: No header for C:\WINDOWS\system32\conhost.exe.  Searching for image on disk 	
00000235	2.90294075	[16544] DBGHELP: C:\WINDOWS\system32\conhost.exe - OK 	
00000236	2.90746856	[16544] SYMSRV:  C:\WINDOWS\Symbols\conhost.pdb\BA25DA8802E1B55EEF17F13C891170EB1\conhost.pdb	
00000237	2.91905880	[16544] DBGHELP: ........ DIA E_PDB_FILE_SYSTEM error from 863 	
00000238	2.91907740	[16544] DBGHELP: C:\WINDOWS\Symbols\conhost.pdb\BA25DA8802E1B55EEF17F13C891170EB1\conhost.pdb - drive not ready 	
00000239	2.91914248	[16544] DBGHELP: C:\WINDOWS\system32\conhost.pdb - file not found 	
00000240	2.92019677	[16544] DBGHELP: conhost.pdb - file not found 	
00000241	2.92025423	[16544] DBGHELP: conhost - no symbols loaded 	
00000242	2.92027235	[16544] UpdateSymbolCache() loading conhost.exe symbols	
00000243	2.92028761	[16544] SymEng_GetAddr ShouldUseConhostV2	
00000244	2.92031431	[16544] SymFromName failed: 0000007E	
00000245	2.92033029	[16544] SymEng_GetAddr ConhostV2ForcedInRegistry	
00000246	2.92034721	[16544] SymFromName failed: 0000007E	
00000247	2.92045426	[16544] DBGHELP: No header for C:\WINDOWS\system32\conhostV1.dll.  Searching for image on disk 	
00000248	2.92051530	[16544] DBGHELP: C:\WINDOWS\system32\conhostV1.dll - OK 	
00000249	2.92069650	[16544] SYMSRV:  C:\WINDOWS\Symbols\ConhostV1.pdb\923DD6A5A61A4F6348488E67DABD234C1\ConhostV1.pdb	
00000250	2.92078471	[16544] DBGHELP: ........ DIA E_PDB_FILE_SYSTEM error from 863 	
00000251	2.92080402	[16544] DBGHELP: C:\WINDOWS\Symbols\ConhostV1.pdb\923DD6A5A61A4F6348488E67DABD234C1\ConhostV1.pdb - drive not ready 	
00000252	2.92085171	[16544] DBGHELP: C:\WINDOWS\system32\ConhostV1.pdb - file not found 	
00000253	2.92172670	[16544] DBGHELP: ConhostV1.pdb - file not found 	
00000254	2.92186666	[16544] DBGHELP: conhostV1 - export symbols 	
00000255	2.92188239	[16544] UpdateSymbolCache() loading conhostV1.dll symbols	
00000256	2.92189693	[16544] SymEng_GetAddr InitializeCustomCP	
00000257	2.92191958	[16544] SymFromName failed: 0000007E	
00000258	2.92395997	[16544] NtCreateUserProcess(ThreadHandle=0, CommandLine=I:\RENTS\BAS\RENTS.EXE) failed with C0000130	
00000259	2.98347926	[16544] LDNTVDM: BasepProcessInvalidImage(C0000130,'\??\I:\RENTS\BAS\RENTS.EXE');	
00000260	2.99414802	[16544] VDMState=00000001	
00000261	2.99545598	[16544] LDNTVDM: Launch DOS!	
00000262	3.01446271	[16544] Injecting into WOW64 Process? 1	
00000263	3.01474524	[16544] Hook_Inline(76fdf5d0, f0000, code)	
00000264	3.01476908	[16544] dwOrigSize detected: 10	
00000265	3.01529312	[16544] About to alloc page @76f2f000	
00000266	3.01534557	[16544] Hook_Inline context=76f20000	
00000267	3.01549006	[16544] Hook_Inline(7ffd0f3be1ac, 100000, code)	
00000268	3.01551127	[16544] dwOrigSize detected: 10	
00000269	3.01611567	[16544] About to alloc page @7ffd0f2df000	
00000270	3.01616049	[16544] Hook_Inline context=7ffd0f2d0000	
00000271	3.01625276	[16544] APPCERT_IMAGE_OK_TO_RUN	
00000272	3.01626825	[16544] APPCERT_CREATION_ALLOWED	
00000273	3.02916121	[18096] LDNTVDM is running inside ntvdm.exe	
00000274	3.02923298	[18096] Hook_IAT_x64(75E80000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 74013FF0)	
00000275	3.02926159	[18096] Hooked 75A85CE0 -> 74013FF0	
00000276	3.02928591	[18096] LDNTVDM: BasepProcessInvalidImageReal = 75A85CE0	
00000277	3.02930760	[18096] LDNTVDM: BaseIsDosApplication = 75AAA490	
00000278	3.02933049	[18096] Hook_IAT_x64_IAT(75E80000, ntdll.dll, NtCreateUserProcess, 74013F20, 740206C0)	
00000279	3.02937365	[18096] Hooked 76FA5700 -> 74013F20	
00000280	3.02940607	[18096] Hook_IAT_x64_IAT(75A50000, ntdll.dll, CsrClientCallServer, 74012690, 7401B000)	
00000281	3.02943158	[18096] Hooked 76FF24A0 -> 74012690	
00000282	3.02945614	[18096] Hook_IAT_x64_IAT(75A50000, ntdll.dll, CsrAllocateMessagePointer, 74012800, 00000000)	
00000283	3.02948070	[18096] Hooked 76FF2360 -> 74012800	
00000284	3.02950406	[18096] Hook_IAT_x64_IAT(F000000, KERNEL32.DLL, SetConsolePalette, 74011160, 740206D4)	
00000285	3.02953124	[18096] Hooked 75AB28B0 -> 74011160	
00000286	3.02955437	[18096] Hook_IAT_x64_IAT(75A50000, ntdll.dll, NtQueryInformationProcess, 74011080, 00000000)	
00000287	3.02958131	[18096] Hooked 76FA4BA0 -> 74011080	
00000288	3.02960277	[18096] Hook_IAT_x64_IAT(75E80000, ntdll.dll, NtQueryInformationProcess, 74011080, 00000000)	
00000289	3.02962923	[18096] Hooked 76FA4BA0 -> 74011080	
00000290	3.02965951	[18096] Hook_Inline(74cf8ab0, 74013590, PrivateExtractIconsWHook)	
00000291	3.02968979	[18096] Hook_Inline did hotpatch -> context=74cf8ab2	
00000292	3.02971148	[18096] Hook_IAT_x64_IAT(74CC0000, api-ms-win-core-file-l1-2-1.dll, ReadFile, 74013510, 740206D0)	
00000293	3.02973366	[18096] Hooking failed (-1)	
00000294	3.02975678	[18096] Hook_IAT_x64_IAT(74CC0000, api-ms-win-core-file-l1-1-0.dll, ReadFile, 74013510, 740206D0)	
00000295	3.02977991	[18096] Hooked 75FA0130 -> 74013510	
00000296	3.08092451	[18096] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000297	3.08291173	[18096] BaseGetNextVDMCommand: ConsoleHandle=000040A8, iTask=00000000	
00000298	3.08295083	[18096] BaseGetNextVDMCommand(268500999) = 00000000	
00000299	3.08582520	[18096] BaseIsFirstVDM(65545) = C0000022	
00000300	3.12958407	[18096] BaseGetNextVDMCommand: ConsoleHandle=000040A8, iTask=00000000	
00000301	3.12965918	[18096] BaseGetNextVDMCommand(268500999) = 00000000	
00000302	3.44073677	[1580] LDNTVDM is running inside WerFault.exe	
00000303	3.44078755	[1580] Hook_IAT_x64(0CA60000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 0B2B453C)	
00000304	3.44080710	[1580] Hooked 0E0A70E0 -> 0B2B453C	
00000305	3.44083166	[1580] LDNTVDM: BasepProcessInvalidImageReal = 0E0A70E0	
00000306	3.44084477	[1580] LDNTVDM: BaseIsDosApplication = 0E0CE9E0	
00000307	3.44085932	[1580] Hook_IAT_x64_IAT(CA60000, ntdll.dll, NtCreateUserProcess, 0B2B43FC, 0B2C2950)	
00000308	3.44089317	[1580] Hooked 0F3850D0 -> 0B2B43FC	
00000309	3.49070477	[1580] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000310	5.67628384	[6620] [AURA HAL][ENE DRAM] Sunc (1,0,5)	
...
00000509	13.52215862	[2640] LDNTVDM is running inside SystemSettings.exe	
00000510	13.52356434	[16908] LDNTVDM is running inside ApplicationFrameHost.exe	
00000511	13.52480316	[6620] Sync0 Address 0x72 ChipID 0x3570	
00000512	13.52606392	[2640] Hook_IAT_x64(0CA60000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 0B2B453C)	
00000513	13.52738857	[16908] Hook_IAT_x64(0CA60000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 0B2B453C)	
00000514	13.52868462	[6620] Sync0 Last Effect ID 0x5 ChipID 0x5	
00000515	13.53012180	[2640] Hooked 0E0A70E0 -> 0B2B453C	
00000516	13.53142834	[16908] Hooked 0E0A70E0 -> 0B2B453C	
00000517	13.53291702	[6620] Sync1 Address 0x72 ChipID 0x3570	
00000518	13.53418922	[2640] LDNTVDM: BasepProcessInvalidImageReal = 0E0A70E0	
00000519	13.53545284	[16908] LDNTVDM: BasepProcessInvalidImageReal = 0E0A70E0	
00000520	13.53674221	[6620] Direction 0	
00000521	13.53816605	[2640] LDNTVDM: BaseIsDosApplication = 0E0CE9E0	
00000522	13.53941154	[16908] LDNTVDM: BaseIsDosApplication = 0E0CE9E0	
00000523	13.54069424	[6620] Sync1 frame_tobe_write 0xB7 effect_support 0x1	
00000524	13.54193878	[2640] Hook_IAT_x64_IAT(CA60000, ntdll.dll, NtCreateUserProcess, 0B2B43FC, 0B2C2950)	
00000525	13.54317093	[16908] Hook_IAT_x64_IAT(CA60000, ntdll.dll, NtCreateUserProcess, 0B2B43FC, 0B2C2950)	
00000526	13.54459190	[2640] Hooked 0F3850D0 -> 0B2B43FC	
00000527	13.54592514	[16908] Hooked 0F3850D0 -> 0B2B43FC	
00000528	14.00708485	[6620] [AURA HAL][ENE DRAM] Sunc (1,0,5)	
00000529	14.00713921	[6620] AURACtrl::Sync	
00000530	14.00721741	[16908] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000531	14.00726414	[2640] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
...
00000662	14.21620464	[6620] Sync1 frame_tobe_write 0xB7 effect_support 0x1	
00000663	14.65336800	[8544] LDNTVDM is running inside UserOOBEBroker.exe	
00000664	14.65340805	[8544] Hook_IAT_x64(0CA60000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 0B2B453C)	
00000665	14.65343475	[8544] Hooked 0E0A70E0 -> 0B2B453C	
00000666	14.65345287	[8544] LDNTVDM: BasepProcessInvalidImageReal = 0E0A70E0	
00000667	14.65347195	[8544] LDNTVDM: BaseIsDosApplication = 0E0CE9E0	
00000668	14.65349483	[8544] Hook_IAT_x64_IAT(CA60000, ntdll.dll, NtCreateUserProcess, 0B2B43FC, 0B2C2950)	
00000669	14.65353298	[8544] Hooked 0F3850D0 -> 0B2B43FC	
00000670	14.65356636	[8544] Hook_Inline(7ffd0d43f9c0, 7ffd0b2b2b94, PrivateExtractIconsWHook)	
00000671	14.65358925	[8544] dwOrigSize detected: 7	
00000672	14.65361786	[8544] Hook_Inline context=7ffd0d4b4e76	
00000673	14.65364170	[8544] Hook_IAT_x64_IAT(D420000, api-ms-win-core-file-l1-2-1.dll, ReadFile, 0B2B2AB0, 0B2C2978)	
00000674	14.65366840	[8544] Hooking failed (-1)	
00000675	14.65370083	[8544] Hook_IAT_x64_IAT(D420000, api-ms-win-core-file-l1-1-0.dll, ReadFile, 0B2B2AB0, 0B2C2978)	
00000676	14.65372944	[8544] Hooked 0CA94420 -> 0B2B2AB0	
00000677	14.71276665	[8544] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000678	14.75612640	[18672] LDNTVDM is running inside FileCoAuth.exe	
00000679	14.75616646	[18672] Hook_IAT_x64(0CA60000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 0B2B453C)	
00000680	14.75618744	[18672] Hooked 0E0A70E0 -> 0B2B453C	
00000681	14.75620651	[18672] LDNTVDM: BasepProcessInvalidImageReal = 0E0A70E0	
00000682	14.75622368	[18672] LDNTVDM: BaseIsDosApplication = 0E0CE9E0	
00000683	14.75624275	[18672] Hook_IAT_x64_IAT(CA60000, ntdll.dll, NtCreateUserProcess, 0B2B43FC, 0B2C2950)	
00000684	14.75627804	[18672] Hooked 0F3850D0 -> 0B2B43FC	
00000685	14.75630569	[18672] Hook_Inline(7ffd0d43f9c0, 7ffd0b2b2b94, PrivateExtractIconsWHook)	
00000686	14.75632668	[18672] dwOrigSize detected: 7	
00000687	14.75635529	[18672] Hook_Inline context=7ffd0d4b4e76	
00000688	14.75637436	[18672] Hook_IAT_x64_IAT(D420000, api-ms-win-core-file-l1-2-1.dll, ReadFile, 0B2B2AB0, 0B2C2978)	
00000689	14.75639534	[18672] Hooking failed (-1)	
00000690	14.75641251	[18672] Hook_IAT_x64_IAT(D420000, api-ms-win-core-file-l1-1-0.dll, ReadFile, 0B2B2AB0, 0B2C2978)	
00000691	14.75643158	[18672] Hooked 0CA94420 -> 0B2B2AB0	
00000692	14.79506397	[2640] Populating UpdatePolicy AllowList	
00000693	14.79524612	[2640] SKU MDM licensing allow list string from SLAPI:	
00000694	14.79526901	[2640] AboveLock|Accounts|ActiveXControls|ADMXIngest|AllowMessageSync|AppHVSI|ApplicationDefaults|AllowAllTrustedApps|AllowAppStoreAutoUpdate|AllowAutomaticAppArchiving|AllowDeveloperUnlock|AllowGameDVR|AllowSharedUserAppData|ApplicationRestrictions|Audit|ConfigureChatIcon|LaunchAppAfterLogOn|MSIAllowUserControlOverInstall|MSIAlwaysInstallWithElevatedPrivileges|RestrictAppDataToSystemVolume|RestrictAppToSystemVolume|AppRuntime|AttachmentManager|Authentication|Autoplay|BitLocker|BITS|Bluetooth|Browser|Camera|Cellular|Connectivity|ControlPolicyConflict|CredentialProviders|CredentialsDelegation|CredentialsUI|Cryptography|DataProtection|DataUsage|Defender|DeliveryOptimization|Desktop|ConfigureSystemGuardLaunch|EnableVirtualizationBasedSecurity|DeviceHealthMonitoring|DeviceInstallation|DeviceLock|Display|DmaGuard|ErrorReporting|Eap|Education|EnterpriseCloudPrint|EventLogService|AllowClipboardHistory|AllowCopyPaste|AllowCortana|AllowDeviceDiscovery|AllowManualMDMUnenrollment|AllowSaveAsOfOfficeFiles|AllowScreenCapture|AllowSharingOfOfficeFiles|AllowSIMErrorDialogPromptWhenNoSIM|AllowSyncMySettings|AllowTailoredExperiencesWithDiagnosticData|AllowTaskSwitcher|AllowThirdPartySuggestionsInWindowsSpotlight|AllowVoiceRecording|DoNotShowFeedbackNotifications|DoNotSyncBrowserSettings|AllowFindMyDevice|ExploitGuard|Feeds|FileExplorer|Games|Handwriting|HumanPresence|InternetExplorer|Kerberos|KioskBrowser|Knobs|LanmanWorkstation|Licensing|LocalPoliciesSecurityOptions|LocalUsersAndGroups|Lockdown|Maps|MemoryDump|MSSecurityGuide|MSSLegacy|Multitasking|NetworkIsolation|NetworkListManager|NewsAndInterests|Notifications|OneDrive|Power|Printers|Privacy|RemoteAssistance|RemoteDesktopServices|RemoteDesktop|RemoteManagement|RemoteProcedureCall|RemoteShell|RestrictedGroups|Search|Security|Settings|SmartScreen|Speech|Start|Storage|System|SystemServices|TaskManager|TaskScheduler|TenantRestrictions|TextInput|TimeLanguageSettings|Troubleshooting|Update|UserRights|VirtualizationBasedTechnology|WiFi|WindowsLogon|WirelessDisplay|Location|WindowsAutopilot|WindowsConnectionManager|WindowsDefenderSecurityCenter|WindowsInkWorkspace|WindowsPowerShell|WindowsSandbox|WiredNetwork	
00000695	14.79528809	[2640] 	
00000696	14.79534721	[2640] All policies are allowed	
00000697	14.83329105	[18672] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000698	16.27603531	[2336] LDNTVDM is running inside taskhostw.exe	
00000699	16.27607346	[2336] Hook_IAT_x64(0CA60000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 0B2B453C)	
00000700	16.27609634	[2336] Hooked 0E0A70E0 -> 0B2B453C	
00000701	16.27611351	[2336] LDNTVDM: BasepProcessInvalidImageReal = 0E0A70E0	
00000702	16.27612877	[2336] LDNTVDM: BaseIsDosApplication = 0E0CE9E0	
00000703	16.27614212	[2336] Hook_IAT_x64_IAT(CA60000, ntdll.dll, NtCreateUserProcess, 0B2B43FC, 0B2C2950)	
00000704	16.27617455	[2336] Hooked 0F3850D0 -> 0B2B43FC	
00000705	16.31977463	[2336] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000706	17.55430222	[6828] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000707	17.55631065	[6828] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000708	17.55809975	[6828] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000709	17.55960083	[6828] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000710	17.56120300	[6828] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000711	18.04552078	[6828] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000712	18.04728699	[6828] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000713	18.04937553	[6828] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000714	18.54718399	[6828] PrivateExtractIconsWHook(c:\windows\system32\imageres.dll)	
00000715	19.57489014	[6620] [AURA HAL][ENE DRAM] Sunc (1,0,5)	
...

After doing this, I switched the shortcut properties to using Raster font 10x18 instead of Consolas and hey presto it worked! But after I switched to trying to another non-Raster and then back to Raster it crashed without any error message at all - rather like OP's situation. Even after rebooting it now will not run at all - no error message, the windows flashes up and disappears. Here is the Dbgview output in this new situation:

00000169	3.03157115	[10316] Injecting into WOW64 Process? 0	
00000170	3.03160262	[10316] Hook_Inline(7ff8a0e3e1ac, 2bac2e00000, code)	
00000171	3.03162026	[10316] dwOrigSize detected: 10	
00000172	3.03227043	[10316] About to alloc page @7ff8a0d5f000	
00000173	3.03231406	[10316] Hook_Inline context=7ff8a0d50000	
00000174	3.03235030	[10316] APPCERT_IMAGE_OK_TO_RUN	
00000175	3.03236556	[10316] APPCERT_CREATION_ALLOWED	
00000176	3.06913829	[10928] LDNTVDM is running inside cmd.exe	
00000177	3.06918311	[10928] Hook_IAT_x64(9E5D0000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 9CD3453C)	
00000178	3.06920886	[10928] Hooked 9F9870E0 -> 9CD3453C	
00000179	3.06923246	[10928] LDNTVDM: BasepProcessInvalidImageReal = 9F9870E0	
00000180	3.06926632	[10928] LDNTVDM: BaseIsDosApplication = 9F9AE9E0	
00000181	3.06933951	[10928] Hook_IAT_x64_IAT(9E5D0000, ntdll.dll, NtCreateUserProcess, 9CD343FC, 9CD42950)	
00000182	3.06938839	[10928] Hooked A0E050D0 -> 9CD343FC	
00000183	3.12318349	[10928] Process has child with PID 11276	
00000184	3.12328005	[10928] Want to inject into child (conhost=1, proc=C:\Windows\System32\conhost.exe)	
00000185	3.12330604	[10928] Injecting into WOW64 Process? 0	
00000186	3.12343359	[10928] Created injection thread h=00000104, tid=15028	
00000187	3.12412429	[11276] LDNTVDM is running inside conhost.exe	
00000188	3.12417817	[11276] Hook_IAT_x64(9E5D0000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 9CD3453C)	
00000189	3.12420130	[11276] Hooked 9F9870E0 -> 9CD3453C	
00000190	3.12422109	[11276] LDNTVDM: BasepProcessInvalidImageReal = 9F9870E0	
00000191	3.12423921	[11276] LDNTVDM: BaseIsDosApplication = 9F9AE9E0	
00000192	3.12426472	[11276] Hook_IAT_x64_IAT(9E5D0000, ntdll.dll, NtCreateUserProcess, 9CD343FC, 9CD42950)	
00000193	3.12431026	[11276] Hooked A0E050D0 -> 9CD343FC	
00000194	3.12433028	[11276] LDNTVDM is running inside ConHost.exe	
00000195	3.12448096	[11276] Hook_IAT_x64_IAT(60080000, ntdll.dll, RtlAllocateHeap, 9CD31304, 9CD42988)	
00000196	3.12450576	[11276] Hooked A0D88AC0 -> 9CD31304	
00000197	3.12452650	[11276] OEMCP_FixNLSTable enter	
00000198	3.12463450	[11276] Peb->OemCodePageData set to 88210000	
00000199	3.12465644	[11276] OEMCP_CallInitializeCustomCP	
00000200	3.12476444	[11276] failed: nt=60080000, fnInitializeCustomCP=0	
00000201	3.12478971	[11276] Hook_Inline(7ff89f3ef9c0, 7ff89cd32b94, PrivateExtractIconsWHook)	
00000202	3.12481213	[11276] dwOrigSize detected: 7	
00000203	3.12484360	[11276] Hook_Inline context=7ff89f464e76	
00000204	3.12486076	[11276] Hook_IAT_x64_IAT(9F3D0000, api-ms-win-core-file-l1-2-1.dll, ReadFile, 9CD32AB0, 9CD42978)	
00000205	3.12487841	[11276] Hooking failed (-1)	
00000206	3.12489486	[11276] Hook_IAT_x64_IAT(9F3D0000, api-ms-win-core-file-l1-1-0.dll, ReadFile, 9CD32AB0, 9CD42978)	
00000207	3.12491322	[11276] Hooked 9E604420 -> 9CD32AB0	
00000208	3.17419147	[11276] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000209	3.17428112	[10928] RtlCreateUserThread Status = 00000000	
00000210	3.17435598	[10928] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000211	3.18943548	[10928] UpdateSymbolCache()	
00000212	3.19023252	[10928] Symsrv options: 00000002	
00000213	3.19027400	[10928] DBGHELP: Symbol Search Path: SRV*C:\WINDOWS\Symbols*C:\Users\Dominic\AppData\Local\Temp\SymbolCache*http://msdl.microsoft.com/download/symbols 	
00000214	3.19030690	[10928] DBGHELP: No header for C:\WINDOWS\system32\conhost.exe.  Searching for image on disk 	
00000215	3.19036841	[10928] DBGHELP: C:\WINDOWS\system32\conhost.exe - OK 	
00000216	3.19496322	[10928] SYMSRV:  C:\WINDOWS\Symbols\conhost.pdb\BA25DA8802E1B55EEF17F13C891170EB1\conhost.pdb	
00000217	3.20514750	[10928] DBGHELP: ........ DIA E_PDB_FILE_SYSTEM error from 863 	
00000218	3.20517349	[10928] DBGHELP: C:\WINDOWS\Symbols\conhost.pdb\BA25DA8802E1B55EEF17F13C891170EB1\conhost.pdb - drive not ready 	
00000219	3.20523596	[10928] DBGHELP: C:\WINDOWS\system32\conhost.pdb - file not found 	
00000220	3.20620608	[10928] DBGHELP: conhost.pdb - file not found 	
00000221	3.20626044	[10928] DBGHELP: conhost - no symbols loaded 	
00000222	3.20627689	[10928] UpdateSymbolCache() loading conhost.exe symbols	
00000223	3.20629120	[10928] SymEng_GetAddr ShouldUseConhostV2	
00000224	3.20631742	[10928] SymFromName failed: 0000007E	
00000225	3.20633292	[10928] SymEng_GetAddr ConhostV2ForcedInRegistry	
00000226	3.20634890	[10928] SymFromName failed: 0000007E	
00000227	3.20646310	[10928] DBGHELP: No header for C:\WINDOWS\system32\conhostV1.dll.  Searching for image on disk 	
00000228	3.20652747	[10928] DBGHELP: C:\WINDOWS\system32\conhostV1.dll - OK 	
00000229	3.20670772	[10928] SYMSRV:  C:\WINDOWS\Symbols\ConhostV1.pdb\923DD6A5A61A4F6348488E67DABD234C1\ConhostV1.pdb	
00000230	3.20679569	[10928] DBGHELP: ........ DIA E_PDB_FILE_SYSTEM error from 863 	
00000231	3.20681429	[10928] DBGHELP: C:\WINDOWS\Symbols\ConhostV1.pdb\923DD6A5A61A4F6348488E67DABD234C1\ConhostV1.pdb - drive not ready 	
00000232	3.20686150	[10928] DBGHELP: C:\WINDOWS\system32\ConhostV1.pdb - file not found 	
00000233	3.20763803	[10928] DBGHELP: ConhostV1.pdb - file not found 	
00000234	3.20779514	[10928] DBGHELP: conhostV1 - export symbols 	
00000235	3.20781088	[10928] UpdateSymbolCache() loading conhostV1.dll symbols	
00000236	3.20782447	[10928] SymEng_GetAddr InitializeCustomCP	
00000237	3.20784712	[10928] SymFromName failed: 0000007E	
00000238	3.20963621	[10928] NtCreateUserProcess(ThreadHandle=0, CommandLine=I:\RENTS\BAS\RENTS.EXE) failed with C0000130	
00000239	3.27475882	[10928] LDNTVDM: BasepProcessInvalidImage(C0000130,'\??\I:\RENTS\BAS\RENTS.EXE');	
00000240	3.28519487	[10928] VDMState=00000001	
00000241	3.28672647	[10928] LDNTVDM: Launch DOS!	
00000410	6.50493813	[20324] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000411	6.50658083	[20324] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000412	6.50820637	[20324] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000413	6.50977039	[20324] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000414	6.73545456	[20324] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000415	6.73723507	[20324] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000416	6.73946238	[20324] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000417	6.74159431	[20324] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000418	11.24928856	[6624] [AURA HAL][ENE DRAM] Sunc (1,0,5)	
00000419	11.25079346	[6624] AURACtrl::Sync	
00000420	11.25280571	[6624] Sync0 Address 0x72 ChipID 0x3570	
00000421	11.25417519	[6624] Sync0 Last Effect ID 0x5 ChipID 0x5	
00000422	11.25545692	[6624] Sync1 Address 0x72 ChipID 0x3570	
00000423	11.25671864	[6624] Direction 0	
00000424	11.25801468	[6624] Sync1 frame_tobe_write 0x3F effect_support 0x1	

dominicraf avatar Feb 01 '22 13:02 dominicraf

Thanks for the log, this seems to be the reason:

00000255	2.92188239	[16544] UpdateSymbolCache() loading conhostV1.dll symbols	
00000256	2.92189693	[16544] SymEng_GetAddr InitializeCustomCP	
00000257	2.92191958	[16544] SymFromName failed: 0000007E	

0x7e means, that symbol was not found. So the debug Symbols do not contain a reference to the function "InitializeCustomCP" in ConhostV1.DLL which is necessary to do the NLS table initialization. My ConhostV1.DLL is still from 06/2021 and version V10.0.22000.1 and contains the required symbol. Maybe you got a newer ConhostV1.dll where the function got ripped out, can you check this? ConhostV1.DLL is in system32 directory. M$ is in the process of removing these NLS functions, but they forgot that some functions depend on it an didn't fix those, which causes the crash. Reimplementing the missing function would be really painful, as they depend on ConhostV1 internal structures.

Judging from inferior M$ Software quality lately, I assume they are mainly developing in India nowadays.. ;-)

leecher1337 avatar Feb 01 '22 14:02 leecher1337

Hmm, my ConhostV1.dll is version 10.0.22000.1, dated 06/2021, so presumably same as yours (352256 bytes). (BTW I edited my previous post to add a second log, did you see it?)

dominicraf avatar Feb 01 '22 14:02 dominicraf

Sounds like a permission problem with the symbol files.

00000229	3.20670772	[10928] SYMSRV:  C:\WINDOWS\Symbols\ConhostV1.pdb\923DD6A5A61A4F6348488E67DABD234C1\ConhostV1.pdb	
00000230	3.20679569	[10928] DBGHELP: ........ DIA E_PDB_FILE_SYSTEM error from 863 	
00000231	3.20681429	[10928] DBGHELP: C:\WINDOWS\Symbols\ConhostV1.pdb\923DD6A5A61A4F6348488E67DABD234C1\ConhostV1.pdb - drive not ready 	
0

Can you check if the file C:\WINDOWS\Symbols\ConhostV1.pdb\923DD6A5A61A4F6348488E67DABD234C1\ConhostV1.pdb is readable and writable for everyone? It should theoretically inherit access permissions from "Symbols" directory which gets set up during install with write permissions for everyone, but maybe it got downloaded from inside a process that has other access permissions and therefore reading the file or writing to the file (updating) is denied.

leecher1337 avatar Feb 01 '22 14:02 leecher1337

Permissions of that file are in gray (and same for 923DD6A5A61A4F6348488E67DABD234C1 and ConhostV1.pdb directories), and show 'Everyone' has all permissions. However the file has 0 size, which seems a bit strange? (So is the file C:\Windows\Symbols\conhost.pdb\BA25DA8802E1B55EEF17F13C891170EB1\conhost.pdb, by the way)

dominicraf avatar Feb 01 '22 14:02 dominicraf

That sometimes happens if symbol downloads fail. When there is a 0 byte file, it doesn't try to redownload it and you are foiled. Try to the delete the 0 byte files, then the loader should download it again, maybe this time without errors

leecher1337 avatar Feb 01 '22 14:02 leecher1337

ok, to re-run the loader do I reinstall NTVDMx64 or rebuild it, or restart the machine?

dominicraf avatar Feb 01 '22 14:02 dominicraf

It should be enough to start another application so that UpdateSymbolCache() function gets re-invoked, but you can also try to reboot.

leecher1337 avatar Feb 01 '22 14:02 leecher1337

I did that and the file(s) Conhostv1.pdb and conhost.pdb magically appeared (as non-zero files), but the 16-bit app still just flashed up in a window and disappeared. I then (unwisely, it seems) deleted the files again (without keeping a backup of Conhostv1.pdb doh!) and tried again. But now they don't re-appear even after re-booting and/or re-installing NTVDMx64.

Now when I try to launch 16-bit app, I get a box saying 'Unsupported 16-bit application' - though NTVDMx64 is installed.

dominicraf avatar Feb 01 '22 14:02 dominicraf

I rebuilt and reinstalled NTVDMx64 and then rebooted. Then I ran the 16-bit app, and up it came - with Consolas font! Great. Then I started a second 16-bit app and both apps immediately disappeared and now neither will restart at all. So trying again with Dbgview shows:

00000001	0.00000000	[6360] Injecting into WOW64 Process? 0	
00000002	0.00003120	[6360] Hook_Inline(7ffe50f7e1ac, 2c57e0b0000, code)	
00000003	0.00007120	[6360] dwOrigSize detected: 10	
00000004	0.00081960	[6360] About to alloc page @7ffe50e9f000	
00000005	0.00086570	[6360] Hook_Inline context=7ffe50e90000	
00000006	0.00089770	[6360] APPCERT_IMAGE_OK_TO_RUN	
00000007	0.00091200	[6360] APPCERT_CREATION_ALLOWED	
00000008	0.03476210	[20896] LDNTVDM is running inside cmd.exe	
00000009	0.03480950	[20896] Hook_IAT_x64(4E5A0000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 4CE3453C)	
00000010	0.03486230	[20896] Hooked 4FD270E0 -> 4CE3453C	
00000011	0.03491520	[20896] LDNTVDM: BasepProcessInvalidImageReal = 4FD270E0	
00000012	0.03492880	[20896] LDNTVDM: BaseIsDosApplication = 4FD4E9E0	
00000013	0.03495860	[20896] Hook_IAT_x64_IAT(4E5A0000, ntdll.dll, NtCreateUserProcess, 4CE343FC, 4CE42950)	
00000014	0.03499570	[20896] Hooked 50F450D0 -> 4CE343FC	
00000015	0.09382320	[20896] Process has child with PID 16820	
00000016	0.09391800	[20896] Want to inject into child (conhost=1, proc=C:\Windows\System32\conhost.exe)	
00000017	0.09394340	[20896] Injecting into WOW64 Process? 0	
00000018	0.09407310	[20896] Created injection thread h=00000104, tid=21344	
00000019	0.09481730	[16820] LDNTVDM is running inside conhost.exe	
00000020	0.09486990	[16820] Hook_IAT_x64(4E5A0000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, 4CE3453C)	
00000021	0.09489480	[16820] Hooked 4FD270E0 -> 4CE3453C	
00000022	0.09491440	[16820] LDNTVDM: BasepProcessInvalidImageReal = 4FD270E0	
00000023	0.09493140	[16820] LDNTVDM: BaseIsDosApplication = 4FD4E9E0	
00000024	0.09494810	[16820] Hook_IAT_x64_IAT(4E5A0000, ntdll.dll, NtCreateUserProcess, 4CE343FC, 4CE42950)	
00000025	0.09498320	[16820] Hooked 50F450D0 -> 4CE343FC	
00000026	0.09500120	[16820] LDNTVDM is running inside ConHost.exe	
00000027	0.09515120	[16820] ShouldUseConhostV2 hook installed @D4E06850	
00000028	0.09517560	[16820] Hook_IAT_x64_IAT(45540000, ntdll.dll, RtlAllocateHeap, 4CE31304, 4CE42988)	
00000029	0.09519810	[16820] Hooked 50EC8AC0 -> 4CE31304	
00000030	0.09540500	[16820] Hook_Inline(7ffe4faaf9c0, 7ffe4ce32b94, PrivateExtractIconsWHook)	
00000031	0.09542860	[16820] dwOrigSize detected: 7	
00000032	0.09545980	[16820] Hook_Inline context=7ffe4fb24e76	
00000033	0.09547690	[16820] Hook_IAT_x64_IAT(4FA90000, api-ms-win-core-file-l1-2-1.dll, ReadFile, 4CE32AB0, 4CE42978)	
00000034	0.09549400	[16820] Hooking failed (-1)	
00000035	0.09551000	[16820] Hook_IAT_x64_IAT(4FA90000, api-ms-win-core-file-l1-1-0.dll, ReadFile, 4CE32AB0, 4CE42978)	
00000036	0.09552900	[16820] Hooked 4E5D4420 -> 4CE32AB0	
00000037	0.15102831	[16820] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000038	0.15111271	[20896] RtlCreateUserThread Status = 00000000	
00000039	0.15117830	[20896] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000040	0.16921359	[20896] UpdateSymbolCache()	
00000041	0.17130040	[20896] NtCreateUserProcess(ThreadHandle=0, CommandLine=I:\RENTS\BAS\RENTS.EXE) failed with C0000130	
00000042	0.22495390	[20896] LDNTVDM: BasepProcessInvalidImage(C0000130,'\??\I:\RENTS\BAS\RENTS.EXE');	
00000043	0.23795439	[20896] VDMState=00000001	
00000044	0.23798349	[20896] LDNTVDM: Launch DOS!	

dominicraf avatar Feb 01 '22 15:02 dominicraf

The reason for the files not reapperaing is that their symbols got cached in the registry in HKLM\Software\ldntvdm and HKLM\WOW3264Node\Software\ldntvdm The symbols only get reloaded if it is necessary due to missing symbols or changed DLL file versions, so you got hit by the caching mechanism. If you want it to redownload everything, after deleting the symbol files, you also have to delete the ldntvdm-Key contents (not the key itself, as this would mess up access permissions).

When reinstalling NTVDMx64, I guess you didn't change the ldntvdm.dll with the one from this thread that contains additional debug info, otherwise it would be visible in the logs. Please retry with the debug-version from this thread .

leecher1337 avatar Feb 01 '22 15:02 leecher1337

Correct sorry. So here is the dbgview output with the amnded ldntvdm.dll installed (still the 16-bit does not run the window just flashes briefly and there is no message):

00000001	0.00000000	[1132] Injecting into WOW64 Process? 0	
00000002	0.00003070	[1132] Hook_Inline(7fffcbb1e1ac, 25e48cb0000, code)	
00000003	0.00005680	[1132] dwOrigSize detected: 10	
00000004	0.00069000	[1132] About to alloc page @7fffcba3f000	
00000005	0.00073230	[1132] Hook_Inline context=7fffcba30000	
00000006	0.00076270	[1132] APPCERT_IMAGE_OK_TO_RUN	
00000007	0.00077920	[1132] APPCERT_CREATION_ALLOWED	
00000008	0.01360580	[18664] LDNTVDM is running inside wlrmdr.exe	
00000009	0.01364560	[18664] Hook_IAT_x64(C8FF0000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, C7A1453C)	
00000010	0.01366610	[18664] Hooked CAED70E0 -> C7A1453C	
00000011	0.01368380	[18664] LDNTVDM: BasepProcessInvalidImageReal = CAED70E0	
00000012	0.01369910	[18664] LDNTVDM: BaseIsDosApplication = CAEFE9E0	
00000013	0.01371490	[18664] Hook_IAT_x64_IAT(C8FF0000, ntdll.dll, NtCreateUserProcess, C7A143FC, C7A22950)	
00000014	0.01374820	[18664] Hooked CBAE50D0 -> C7A143FC	
00000015	0.01377000	[18664] Hook_Inline(7fffcb86f9c0, 7fffc7a12b94, PrivateExtractIconsWHook)	
00000016	0.01378810	[18664] dwOrigSize detected: 7	
00000017	0.01381550	[18664] Hook_Inline context=7fffcb8e4e76	
00000018	0.01383150	[18664] Hook_IAT_x64_IAT(CB850000, api-ms-win-core-file-l1-2-1.dll, ReadFile, C7A12AB0, C7A22978)	
00000019	0.01384750	[18664] Hooking failed (-1)	
00000020	0.01386310	[18664] Hook_IAT_x64_IAT(CB850000, api-ms-win-core-file-l1-1-0.dll, ReadFile, C7A12AB0, C7A22978)	
00000021	0.01388030	[18664] Hooked C9024420 -> C7A12AB0	
00000022	0.06609380	[18664] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000023	0.94413632	[9780] VoiceControlEngine.exe Information: 0 : 	
00000024	0.94444072	[9780] SAPI does not implement phonetic alphabet selection. 	
00000025	1.25459611	[17916] LDNTVDM is running inside LocationNotificationWindows.exe	
00000026	1.25463450	[17916] Hook_IAT_x64(C8FF0000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, C7A1453C)	
00000027	1.25465548	[17916] Hooked CAED70E0 -> C7A1453C	
00000028	1.25467348	[17916] LDNTVDM: BasepProcessInvalidImageReal = CAED70E0	
00000029	1.25468981	[17916] LDNTVDM: BaseIsDosApplication = CAEFE9E0	
00000030	1.25470614	[17916] Hook_IAT_x64_IAT(C8FF0000, ntdll.dll, NtCreateUserProcess, C7A143FC, C7A22950)	
00000031	1.25474000	[17916] Hooked CBAE50D0 -> C7A143FC	
00000032	1.25476241	[17916] Hook_Inline(7fffcb86f9c0, 7fffc7a12b94, PrivateExtractIconsWHook)	
00000033	1.25478435	[17916] dwOrigSize detected: 7	
00000034	1.25481057	[17916] Hook_Inline context=7fffcb8e4e76	
00000035	1.25482690	[17916] Hook_IAT_x64_IAT(CB850000, api-ms-win-core-file-l1-2-1.dll, ReadFile, C7A12AB0, C7A22978)	
00000036	1.25484347	[17916] Hooking failed (-1)	
00000037	1.25486159	[17916] Hook_IAT_x64_IAT(CB850000, api-ms-win-core-file-l1-1-0.dll, ReadFile, C7A12AB0, C7A22978)	
00000038	1.25487864	[17916] Hooked C9024420 -> C7A12AB0	
00000039	1.31879854	[17916] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000040	2.61359048	[6488] Injecting into WOW64 Process? 0	
00000041	2.61361957	[6488] Hook_Inline(7fffcbb1e1ac, 2bf3f940000, code)	
00000042	2.61364460	[6488] dwOrigSize detected: 10	
00000043	2.61428428	[6488] About to alloc page @7fffcba3f000	
00000044	2.61432552	[6488] Hook_Inline context=7fffcba30000	
00000045	2.61435652	[6488] APPCERT_IMAGE_OK_TO_RUN	
00000046	2.61437130	[6488] APPCERT_CREATION_ALLOWED	
00000047	2.65285444	[4260] LDNTVDM is running inside cmd.exe	
00000048	2.65290689	[4260] Hook_IAT_x64(C8FF0000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, C7A1453C)	
00000049	2.65293789	[4260] Hooked CAED70E0 -> C7A1453C	
00000050	2.65296674	[4260] LDNTVDM: BasepProcessInvalidImageReal = CAED70E0	
00000051	2.65298271	[4260] LDNTVDM: BaseIsDosApplication = CAEFE9E0	
00000052	2.65300941	[4260] Hook_IAT_x64_IAT(C8FF0000, ntdll.dll, NtCreateUserProcess, C7A143FC, C7A22950)	
00000053	2.65306020	[4260] Hooked CBAE50D0 -> C7A143FC	
00000054	2.70890355	[4260] Process has child with PID 17924	
00000055	2.70899534	[4260] Want to inject into child (conhost=1, proc=C:\Windows\System32\conhost.exe)	
00000056	2.70901990	[4260] Injecting into WOW64 Process? 0	
00000057	2.70914674	[4260] Created injection thread h=00000104, tid=17548	
00000058	2.70980549	[17924] LDNTVDM is running inside conhost.exe	
00000059	2.70982313	[17924] Hook_IAT_x64(C8FF0000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, C7A1453C)	
00000060	2.70984840	[17924] Hooked CAED70E0 -> C7A1453C	
00000061	2.70986772	[17924] LDNTVDM: BasepProcessInvalidImageReal = CAED70E0	
00000062	2.70988750	[17924] LDNTVDM: BaseIsDosApplication = CAEFE9E0	
00000063	2.70990372	[17924] Hook_IAT_x64_IAT(C8FF0000, ntdll.dll, NtCreateUserProcess, C7A143FC, C7A22950)	
00000064	2.70993876	[17924] Hooked CBAE50D0 -> C7A143FC	
00000065	2.70995688	[17924] LDNTVDM is running inside ConHost.exe	
00000066	2.71010566	[17924] ShouldUseConhostV2 hook installed @15A96850	
00000067	2.71012950	[17924] Hook_IAT_x64_IAT(827D0000, ntdll.dll, RtlAllocateHeap, C7A11304, C7A22988)	
00000068	2.71015143	[17924] Hooked CBA68AC0 -> C7A11304	
00000069	2.71017170	[17924] OEMCP_FixNLSTable enter	
00000070	2.71027303	[17924] Peb->OemCodePageData set to 94A90000	
00000071	2.71029353	[17924] OEMCP_CallInitializeCustomCP	
00000072	2.71041679	[17924] Hook_Inline(7fffcb86f9c0, 7fffc7a12b94, PrivateExtractIconsWHook)	
00000073	2.71043921	[17924] dwOrigSize detected: 7	
00000074	2.71046948	[17924] Hook_Inline context=7fffcb8e4e76	
00000075	2.71048665	[17924] Hook_IAT_x64_IAT(CB850000, api-ms-win-core-file-l1-2-1.dll, ReadFile, C7A12AB0, C7A22978)	
00000076	2.71050692	[17924] Hooking failed (-1)	
00000077	2.71052289	[17924] Hook_IAT_x64_IAT(CB850000, api-ms-win-core-file-l1-1-0.dll, ReadFile, C7A12AB0, C7A22978)	
00000078	2.71054292	[17924] Hooked C9024420 -> C7A12AB0	
00000079	2.75668025	[17924] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000080	2.75678706	[4260] RtlCreateUserThread Status = 00000000	
00000081	2.75684714	[4260] ldntvdm Init done (https://github.com/leecher1337/ntvdmx64)	
00000082	2.77180767	[4260] UpdateSymbolCache()	
00000083	2.77382445	[4260] NtCreateUserProcess(ThreadHandle=0, CommandLine=I:\RENTS\BAS\RENTS.EXE) failed with C0000130	
00000084	2.82191992	[4260] LDNTVDM: BasepProcessInvalidImage(C0000130,'\??\I:\RENTS\BAS\RENTS.EXE');	
00000085	2.85863948	[4260] VDMState=00000001	
00000086	2.86000037	[4260] LDNTVDM: Launch DOS!	
00000087	3.43808532	[6664] [AURA HAL][ENE DRAM] Sunc (1,0,5)	
00000088	3.43817925	[6664] AURACtrl::Sync	
00000089	3.43823767	[6664] Sync0 Address 0x72 ChipID 0x3570	
00000090	3.43830967	[6664] Sync0 Last Effect ID 0x5 ChipID 0x5	
00000091	3.43835235	[6664] Sync1 Address 0x72 ChipID 0x3570	
00000092	3.43839478	[6664] Direction 0	
00000093	3.43844366	[6664] Sync1 frame_tobe_write 0x63 effect_support 0x1	
00000094	3.44797802	[6664] [AURA HAL][ENE DRAM] Sunc (1,0,5)	
00000095	3.44802237	[6664] AURACtrl::Sync	
00000096	3.44806075	[6664] Sync0 Address 0x72 ChipID 0x3570	
00000097	3.44809675	[6664] Sync0 Last Effect ID 0x5 ChipID 0x5	
00000098	3.44813108	[6664] Sync1 Address 0x72 ChipID 0x3570	
00000099	3.44816566	[6664] Direction 0	
00000100	3.44819999	[6664] Sync1 frame_tobe_write 0x63 effect_support 0x1	
00000255	6.95117140	[19452] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000256	6.95415115	[19452] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000257	6.95601177	[19452] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000258	6.95783424	[19452] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000259	6.95953703	[19452] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000260	7.39219379	[19452] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000261	7.39397430	[19452] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000262	7.39575052	[19452] PrivateExtractIconsWHook(C:\WINDOWS\system32\imageres.dll)	
00000263	9.38723087	[6664] [AURA HAL][ENE DRAM] Sunc (1,0,5)	
00000264	9.38864708	[6664] AURACtrl::Sync	
00000265	9.39072800	[16112] LDNTVDM is running inside MoNotificationUx.exe	
00000266	9.39214039	[6664] Sync0 Address 0x72 ChipID 0x3570	
00000267	9.39343739	[16112] Hook_IAT_x64(C8FF0000, ext-ms-win-kernelbase-processthread-l1-1-0.dll, BasepProcessInvalidImage, C7A1453C)	
00000268	9.39470291	[6664] Sync0 Last Effect ID 0x5 ChipID 0x5	
00000269	9.39595985	[16112] Hooked CAED70E0 -> C7A1453C	
00000270	9.39720917	[6664] Sync1 Address 0x72 ChipID 0x3570	
00000271	9.39844894	[16112] LDNTVDM: BasepProcessInvalidImageReal = CAED70E0	
00000272	9.39970016	[6664] Direction 0	
00000273	9.40094280	[16112] LDNTVDM: BaseIsDosApplication = CAEFE9E0	
00000274	9.40223217	[6664] Sync1 frame_tobe_write 0xD4 effect_support 0x1	
00000275	9.40372849	[16112] Hook_IAT_x64_IAT(C8FF0000, ntdll.dll, NtCreateUserProcess, C7A143FC, C7A22950)	
00000276	9.40507889	[16112] Hooked CBAE50D0 -> C7A143FC	
00000277	9.40632820	[16112] Hook_Inline(7fffcb86f9c0, 7fffc7a12b94, PrivateExtractIconsWHook)	
00000278	9.40756702	[16112] dwOrigSize detected: 7	
00000279	9.40882778	[16112] Hook_Inline context=7fffcb8e4e76	
00000280	9.41006088	[16112] Hook_IAT_x64_IAT(CB850000, api-ms-win-core-file-l1-2-1.dll, ReadFile, C7A12AB0, C7A22978)	
00000281	9.41130543	[16112] Hooking failed (-1)	
00000282	9.41255951	[16112] Hook_IAT_x64_IAT(CB850000, api-ms-win-core-file-l1-1-0.dll, ReadFile, C7A12AB0, C7A22978)	
00000283	9.41379833	[6664] [AURA HAL][ENE DRAM] Sunc (1,0,5)	
00000284	9.41505718	[16112] Hooked C9024420 -> C7A12AB0	
00000301	10.39632225	[16112] Populating UpdatePolicy AllowList	
00000302	10.39760780	[6664] Sync0 Address 0x72 ChipID 0x3570	
00000303	10.39888191	[16112] SKU MDM licensing allow list string from SLAPI:	
00000304	10.40014458	[6664] Sync0 Last Effect ID 0x5 ChipID 0x5	
00000305	10.40140343	[16112] AboveLock|Accounts|ActiveXControls|ADMXIngest|AllowMessageSync|AppHVSI|ApplicationDefaults|AllowAllTrustedApps|AllowAppStoreAutoUpdate|AllowAutomaticAppArchiving|AllowDeveloperUnlock|AllowGameDVR|AllowSharedUserAppData|ApplicationRestrictions|Audit|ConfigureChatIcon|LaunchAppAfterLogOn|MSIAllowUserControlOverInstall|MSIAlwaysInstallWithElevatedPrivileges|RestrictAppDataToSystemVolume|RestrictAppToSystemVolume|AppRuntime|AttachmentManager|Authentication|Autoplay|BitLocker|BITS|Bluetooth|Browser|Camera|Cellular|Connectivity|ControlPolicyConflict|CredentialProviders|CredentialsDelegation|CredentialsUI|Cryptography|DataProtection|DataUsage|Defender|DeliveryOptimization|Desktop|ConfigureSystemGuardLaunch|EnableVirtualizationBasedSecurity|DeviceHealthMonitoring|DeviceInstallation|DeviceLock|Display|DmaGuard|ErrorReporting|Eap|Education|EnterpriseCloudPrint|EventLogService|AllowClipboardHistory|AllowCopyPaste|AllowCortana|AllowDeviceDiscovery|AllowManualMDMUnenrollment|AllowSaveAsOfOfficeFiles|AllowScreenCapture|AllowSharingOfOfficeFiles|AllowSIMErrorDialogPromptWhenNoSIM|AllowSyncMySettings|AllowTailoredExperiencesWithDiagnosticData|AllowTaskSwitcher|AllowThirdPartySuggestionsInWindowsSpotlight|AllowVoiceRecording|DoNotShowFeedbackNotifications|DoNotSyncBrowserSettings|AllowFindMyDevice|ExploitGuard|Feeds|FileExplorer|Games|Handwriting|HumanPresence|InternetExplorer|Kerberos|KioskBrowser|Knobs|LanmanWorkstation|Licensing|LocalPoliciesSecurityOptions|LocalUsersAndGroups|Lockdown|Maps|MemoryDump|MSSecurityGuide|MSSLegacy|Multitasking|NetworkIsolation|NetworkListManager|NewsAndInterests|Notifications|OneDrive|Power|Printers|Privacy|RemoteAssistance|RemoteDesktopServices|RemoteDesktop|RemoteManagement|RemoteProcedureCall|RemoteShell|RestrictedGroups|Search|Security|Settings|SmartScreen|Speech|Start|Storage|System|SystemServices|TaskManager|TaskScheduler|TenantRestrictions|TextInput|TimeLanguageSettings|Troubleshooting|Update|UserRights|VirtualizationBasedTechnology|WiFi|WindowsLogon|WirelessDisplay|Location|WindowsAutopilot|WindowsConnectionManager|WindowsDefenderSecurityCenter|WindowsInkWorkspace|WindowsPowerShell|WindowsSandbox|WiredNetwork	
00000306	10.40516853	[6664] Sync1 Address 0x72 ChipID 0x3570	
00000307	10.40866089	[16112] 	
00000308	10.41006184	[6664] Direction 0	
00000309	10.41136646	[16112] All policies are allowed	
00000310	10.41267586	[6664] Sync1 frame_tobe_write 0xD4 effect_support 0x1	
00000311	10.88105583	[6664] [AURA HAL][ENE DRAM] Sunc (1,0,5)	
00000312	10.88247204	[6664] AURACtrl::Sync	
00000313	10.88440418	[6664] Sync0 Address 0x72 ChipID 0x3570	
00000314	10.91080284	[6664] Sync0 Last Effect ID 0x5 ChipID 0x5	
00000315	10.91291523	[6664] Sync1 Address 0x72 ChipID 0x3570	
00000316	10.91415215	[6664] Direction 0	
00000317	10.93668461	[6664] Sync1 frame_tobe_write 0xD4 effect_support 0x1	
00000318	10.93923378	[6664] [AURA HAL][ENE DRAM] Sunc (1,0,5)	

dominicraf avatar Feb 01 '22 16:02 dominicraf

Cannot find anything suspicious in the logs now. Could be that conhost crashes or that it just doesn't launch NTVDM as it should. You can check Windows Event log to see if conhost.exe still crashes or if another application crashes on startup? If you launch a dos application from cmd.exe, does the console window vanish or is it just that the DOS application doesn't start? If conhost.exe crashes, you can attach a debugger like x64dbg to conhost.exe process and see where it crashes.

leecher1337 avatar Feb 01 '22 16:02 leecher1337

If I try to launch from a command prompt I see a message saying the file cannot be found, although it is clearly there.

C:\Users\Dominic>dir C:\UTILS\VBDOS.EXE
 Volume in drive C is DOMC
 Volume Serial Number is 988D-9F76

 Directory of C:\UTILS

19/08/1992  22:59           555,520 VBDOS.EXE
               1 File(s)        555,520 bytes
               0 Dir(s)  240,303,177,728 bytes free

C:\Users\Dominic>cmd.exe /C C:\UTILS\VBDOS.EXE
The system cannot find the file C:\UTILS\VBDOS.EXE.

dominicraf avatar Feb 01 '22 16:02 dominicraf

This sounds like Windows\system32\ntvdm.exe and/or Windows\SysWOW64\ntvdm.exe is not present, are you sure that it's there and executable?

leecher1337 avatar Feb 01 '22 17:02 leecher1337

ntvdm.exe is present (and executable) in SysWOW64 but is not present in system32.

dominicraf avatar Feb 01 '22 18:02 dominicraf

Then the hard linking on installation went wrong for whatever reason.

fsutil hardlink create  %SYSTEMROOT%\System32\ntvdm.exe %SYSTEMROOT%\SysWOW64\ntvdm.exe

No idea why that failed during setup on your machine.

leecher1337 avatar Feb 01 '22 18:02 leecher1337

Hmm, I think it might be an antivirus thing. I will uninstall Avast (can't do this until tomorrow) and then try again.

dominicraf avatar Feb 01 '22 18:02 dominicraf

Was getting nowhere trying to make ntvdm work with my upgrade from win10 to win11. With the patch already installed on win10 and uninstalled before the update, updating to 11 seems to break something. Installed 11 fresh and everything is working as it should, thanks again leecher for your efforts!

Chet303 avatar Feb 02 '22 03:02 Chet303

After I removed Avast (which wasn't easy) and again created the hard link as you advised (it kept disappearing before) it all works, with Consolas. Thanks for your help in resolving this. I suspect all my problems with Windows 11 were down to the antivirus.

NTVDMx64 is a fantastic project! Thanks @leecher1337 for all your work on it.

dominicraf avatar Feb 02 '22 19:02 dominicraf

Note to others: if you use Windows Defender you need to make exclusions for C:\Windows\System32\ldntvdm.dll and C:\Windows\SysWOW64\ldntvdm.dll (at least under Windows 11) [ Settings / Virus and threat protection / under 'Virus & threat protection settings' click 'Manage settings' / 'Add or remove exclusions' ]. Similar exceptions are likely required with other antivirus products.

dominicraf avatar Feb 06 '22 08:02 dominicraf