Here is the log from Dr. Watson:
Application exception occurred:
App: C:\Program Files\Internet Explorer\iexplore.exe (pid=2928)
When: 10/18/2004 @ 23:28:24.609
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: DC294221
User Name: Tammy Wyatt
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 15 Model 2 Stepping 7
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: Tammy Wyatt
*----> Task List <----*
0 System Process
4 System
424 smss.exe
660 csrss.exe
688 winlogon.exe
732 services.exe
744 lsass.exe
900 svchost.exe
976 svchost.exe
1072 svchost.exe
1156 svchost.exe
1336 svchost.exe
1468 LEXBCES.EXE
1500 spoolsv.exe
1536 LEXPPS.EXE
1676 ccSetMgr.exe
1692 cisvc.exe
1736 KodakCCS.exe
1764 navapsvc.exe
1820 NPROTECT.EXE
1844 nvsvc32.exe
1936 SAVScan.exe
1988 ScsiAccess.EXE
2016 svchost.exe
188 symlcsvc.exe
232 ccEvtMgr.exe
336 SymWSC.exe
1044 alg.exe
588 Explorer.EXE
2140 BCMSMMSG.exe
2156 DirectCD.exe
2240 tgcmd.exe
2268 dlbkbmgr.exe
2328 qttask.exe
2344 ccApp.exe
2360 mmtask.exe
2368 ctfmon.exe
2376 dlbkbmon.exe
2532 DLG.exe
2584 EasyShare.exe
2600 wkcalrem.exe
3500 cidaemon.exe
3524 cidaemon.exe
2352 realsched.exe
2928 iexplore.exe
4668 msimn.exe
3936 msmsgs.exe
224 urlmap.exe
2872 dwwin.exe
2520 drwtsn32.exe
*----> Module List <----*
(0000000000400000 - 0000000000419000: C:\Program Files\Internet Explorer\iexplore.exe
(0000000001510000 - 0000000001598000: C:\WINDOWS\system32\shdoclc.dll
(00000000017c0000 - 000000000187b000: C:\SPYBOT~1.3\SPYBOT~1\SDHelper.dll
(0000000001980000 - 0000000001a33000: c:\program files\google\googletoolbar2.dll
(0000000001a60000 - 0000000001a78000: C:\Program Files\Norton AntiVirus\NavShExt.dll
(0000000001a90000 - 0000000001ab4000: C:\Program Files\Microsoft Money\System\mnyviewer.dll
(0000000001b00000 - 0000000001dc5000: C:\WINDOWS\system32\xpsp2res.dll
(0000000002b20000 - 0000000002b3e000: C:\Program Files\Common Files\Symantec Shared\Script Blocking\scrauth.dll
(0000000002b50000 - 0000000002b70000: C:\Program Files\Common Files\Symantec Shared\Script Blocking\ScrBlock.dll
(0000000003e50000 - 0000000003e57000: C:\Program Files\Microsoft Money\System\urlmapps.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 000000001000b000: C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
(0000000020000000 - 0000000020012000: C:\WINDOWS\system32\browselc.dll
(000000004d4f0000 - 000000004d548000: C:\WINDOWS\system32\WINHTTP.dll
(0000000059a60000 - 0000000059b01000: C:\WINDOWS\system32\DBGHELP.DLL
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005b0a0000 - 000000005b0a7000: C:\WINDOWS\system32\umdmxfrm.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005cd70000 - 000000005cd77000: C:\WINDOWS\system32\serwvdrv.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl32.dll
(000000005edd0000 - 000000005ede7000: C:\WINDOWS\system32\olepro32.dll
(000000005fff0000 - 000000005fffe000: C:\Program Files\Support.com\bin\sdcidle.dll
(00000000629c0000 - 00000000629c9000: C:\WINDOWS\system32\LPK.DLL
(0000000064640000 - 000000006464d000: C:\Program Files\Support.com\bin\sdchook.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000066e50000 - 0000000066e8f000: C:\WINDOWS\System32\iepeers.dll
(0000000067c70000 - 0000000067cbc000: C:\Program Files\Support.com\bin\FULLSOFT.DLL
(0000000068100000 - 0000000068124000: C:\WINDOWS\system32\dssenh.dll
(000000006bdd0000 - 000000006be05000: C:\WINDOWS\System32\dxtrans.dll
(000000006be10000 - 000000006be6a000: C:\WINDOWS\System32\dxtmsft.dll
(000000006cc60000 - 000000006cc6b000: C:\WINDOWS\System32\dispex.dll
(000000006d430000 - 000000006d43a000: C:\WINDOWS\System32\ddrawex.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\system32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxprxy.dll
(00000000722b0000 - 00000000722b5000: C:\WINDOWS\system32\sensapi.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(0000000073000000 - 0000000073026000: C:\WINDOWS\System32\WINSPOOL.DRV
(0000000073300000 - 0000000073367000: c:\windows\system32\vbscript.dll
(0000000073760000 - 00000000737a9000: C:\WINDOWS\System32\DDRAW.dll
(0000000073bc0000 - 0000000073bc6000: C:\WINDOWS\System32\DCIMAN32.dll
(0000000073dd0000 - 0000000073ece000: C:\WINDOWS\system32\MFC42.DLL
(00000000746c0000 - 00000000746e7000: C:\WINDOWS\System32\msls31.dll
(00000000746f0000 - 000000007471a000: C:\WINDOWS\System32\msimtf.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000074d90000 - 0000000074dfb000: C:\WINDOWS\system32\USP10.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(00000000755c0000 - 00000000755ee000: C:\WINDOWS\system32\msctfime.ime
(0000000075c50000 - 0000000075cbe000: c:\windows\system32\jscript.dll
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\mlang.dll
(0000000075e60000 - 0000000075e73000: C:\WINDOWS\system32\cryptnet.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000075f80000 - 000000007607c000: C:\WINDOWS\system32\BROWSEUI.dll
(0000000076200000 - 0000000076271000: C:\WINDOWS\System32\mshtmled.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(00000000767f0000 - 0000000076817000: C:\WINDOWS\system32\schannel.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.DLL
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: C:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(0000000077260000 - 00000000772fe000: C:\WINDOWS\system32\urlmon.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll
(00000000774e0000 - 000000007761c000: C:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778cc000: C:\WINDOWS\system32\SHDOCVW.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(000000007c000000 - 000000007c054000: C:\WINDOWS\system32\MSVCR70.dll
(000000007c080000 - 000000007c0f7000: C:\WINDOWS\system32\MSVCP70.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d4000: C:\WINDOWS\system32\SHELL32.dll
(000000007d1e0000 - 000000007d492000: C:\WINDOWS\system32\msi.dll
(000000007d4a0000 - 000000007d783000: C:\WINDOWS\System32\mshtml.dll
*----> State Dump for Thread Id 0x2cc <----*
eax=02d98080 ebx=00000001 ecx=05bf8cf8 edx=00cc0008 esi=02dc8d78 edi=01a56df0
eip=00680097 esp=0013a30c ebp=0013a34c iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
function: <nosymbols>
00680080 0000 add [eax],al
00680082 0000 add [eax],al
00680084 0000 add [eax],al
00680086 0000 add [eax],al
00680088 0000 add [eax],al
0068008a 0000 add [eax],al
0068008c 0000 add [eax],al
0068008e 0000 add [eax],al
00680090 0500470000 add eax,0x4700
00680095 0010 add [eax],dl
FAULT ->00680097 00a00166bca0 add [eax+0xa0bc6601],ah ds:0023:a395e681=??
0068009d 0166bc add [esi-0x44],esp
006800a0 0000 add [eax],al
006800a2 0000 add [eax],al
006800a4 0000 add [eax],al
006800a6 0000 add [eax],al
006800a8 0000 add [eax],al
006800aa 0000 add [eax],al
006800ac 0000 add [eax],al
006800ae 0000 add [eax],al
006800b0 06 push es
*----> Stack Back Trace <----*
*** WARNING: Unable to verify checksum for c:\program files\google\googletoolbar2.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for c:\program files\google\googletoolbar2.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\urlmon.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\System32\mshtml.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\BROWSEUI.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SHDOCVW.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Internet Explorer\iexplore.exe -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0013a34c 019b489b 0013a360 01a56df0 01a56df0 0x680097
0013a370 01994317 0013a3d4 01a56df0 00000000 googletoolbar2!DllInfoA+0x13dd2
0013a384 01998e57 0013a3d4 00000001 0461e7c8 googletoolbar2+0x14317
0013a3b4 7727aafd 00cc0008 772d4964 0460c210 googletoolbar2+0x18e57
0013abec 7727ad8e 00000000 0461e7c8 77283232 urlmon!CreateAsyncBindCtx+0xf69
0013ac10 77273287 00000000 0461e7c8 0461e7dc urlmon!CreateAsyncBindCtx+0x11fa
0013ac3c 772710cd 00000001 046b60a8 02e1c278 urlmon!CopyStgMedium+0x99d
0013ac64 77270fb8 0461e7d0 046b60a8 02e1c278 urlmon!FindMediaType+0x1a91
0013acb4 772716ff 02e1c278 046b60a8 02e7d850 urlmon!FindMediaType+0x197c
0013ad38 7727135c 0013ad80 05ba9f78 7d4b5ec0 urlmon!FindMediaType+0x20c3
0013bdd0 77271226 001f44e0 00000000 05ba9f78 urlmon!FindMediaType+0x1d20
0013be08 7d52748b 001f44e0 05ba9f78 00000000 urlmon!FindMediaType+0x1bea
0013c064 7d5021c2 0013c190 873f0000 0013c190 mshtml+0x8748b
0013c080 7d502105 0013c190 02716524 873f0000 mshtml+0x621c2
0013c0a4 7d502f20 0013c190 027158d0 00001fdd mshtml+0x62105
0013c0f4 7d502565 027166c0 027158d0 00000001 mshtml+0x62f20
0013c118 7d4f5b9a 02715d20 00000001 00000000 mshtml+0x62565
0013c13c 7d4f5b32 00000001 0013c190 00000000 mshtml+0x55b9a
0013c158 7d50116d 00000001 0013c190 00000000 mshtml+0x55b32
0013c178 7d500fb3 02715d20 0270f400 00000000 mshtml+0x6116d
0013c304 7d520637 0462b8d0 00000000 0275d870 mshtml+0x60fb3
0013e4a4 7d51fe8c 0013e560 0013e548 0270f400 mshtml+0x80637
0013e564 7d722075 02742400 00000000 0263d130 mshtml+0x7fe8c
0013e5e4 7d7200b3 00000000 0263d340 0013e614 mshtml+0x282075
0013e5f4 7d6008b1 0013e76c 0263d130 0263d340 mshtml+0x2800b3
0013e614 7d720380 0013e76c 0263d340 00000000 mshtml!CreateHTMLPropertyPage+0x1ed42
0013e63c 7d59bfcd 0013e76c 0263d340 00000000 mshtml+0x280380
0013e6c4 7d5851b2 00000000 0263d130 0263d340 mshtml!DllGetClassObject+0x2195f
0013e810 7d550ac4 00000202 00000000 008c022c mshtml!DllGetClassObject+0xab44
0013e92c 7d4f244b 00000000 00000202 00000000 mshtml+0xb0ac4
0013ea64 77d48709 005c03fa 00000202 00000000 mshtml+0x5244b
0013ea90 77d487eb 7d4f23d5 005c03fa 00000202 USER32!GetDC+0x72
0013eaf8 77d489a5 00000000 7d4f23d5 005c03fa USER32!GetDC+0x154
0013eb58 77d489e8 0013eb98 00000000 0013eb80 USER32!GetWindowLongW+0x127
0013eb68 75fa688d 0013eb98 00000000 00163d30 USER32!DispatchMessageW+0xf
0013eb80 75fae1ba 0013eb98 0013ee98 00000000 BROWSEUI!Ordinal107+0x44ae
0013ede0 75fae321 00163ba0 0013ee98 00163ba0 BROWSEUI!Ordinal107+0xbddb
0013ee6c 75fae5c5 00163ba0 00163ba0 00000000 BROWSEUI!Ordinal107+0xbf42
0013fef0 777e6be2 00163ba0 00000000 00000000 BROWSEUI!Ordinal102+0x22c
0013ff10 00402372 001523ba 00000001 00090000 SHDOCVW!Ordinal101+0x129
0013ff60 00402444 00400000 00000000 001523ba iexplore+0x2372
0013ffc0 7c816d4f 00090000 00110e20 7ffdf000 iexplore+0x2444
0013fff0 00000000 00402451 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49
*----> Raw Stack Dump <----*
000000000013a30c 28 1e 98 01 f0 6d a5 01 - 3c a3 13 00 4c 27 98 01 (....m..<...L'..
000000000013a31c 78 8d dc 02 00 00 00 00 - ab 47 9b 01 f0 6d a5 01 x........G...m..
000000000013a32c c8 6d a5 01 00 00 00 00 - 01 00 00 00 00 00 00 00 .m..............
000000000013a33c f0 6d a5 01 64 a3 13 00 - ae 1d 9e 01 ff ff ff ff .m..d...........
000000000013a34c 70 a3 13 00 9b 48 9b 01 - 60 a3 13 00 f0 6d a5 01 p....H..`....m..
000000000013a35c f0 6d a5 01 00 00 00 00 - a8 a3 13 00 c8 1d 9e 01 .m..............
000000000013a36c ff ff ff ff 84 a3 13 00 - 17 43 99 01 d4 a3 13 00 .........C......
000000000013a37c f0 6d a5 01 00 00 00 00 - b4 a3 13 00 57 8e 99 01 .m..........W...
000000000013a38c d4 a3 13 00 01 00 00 00 - c8 e7 61 04 0a 00 00 80 ..........a.....
000000000013a39c e0 78 a0 01 01 05 91 7c - 00 00 00 00 e8 ea 13 00 .x.....|........
000000000013a3ac 9f f6 9d 01 00 00 00 00 - ec ab 13 00 fd aa 27 77 ..............'w
000000000013a3bc 08 00 cc 00 64 49 2d 77 - 10 c2 60 04 00 00 00 00 ....dI-w..`.....
000000000013a3cc 00 00 00 00 e8 a7 13 00 - 80 82 a5 01 0c 00 cc 00 ................
000000000013a3dc 08 00 cc 00 c8 e7 61 04 - dc e7 61 04 00 00 00 00 ......a...a.....
000000000013a3ec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000013a3fc 00 00 00 00 00 00 00 00 - 00 f0 fd 7f 05 10 90 7c ...............|
000000000013a40c 00 00 00 00 f6 04 01 00 - 02 00 00 00 18 02 00 00 ................
000000000013a41c c3 46 91 7c 30 a4 13 00 - 00 00 00 00 c8 05 91 7c .F.|0..........|
000000000013a42c 00 e0 15 00 fc a4 13 00 - 51 05 91 7c 08 17 15 00 ........Q..|....
000000000013a43c 6d 05 91 7c 1c 4a b4 76 - dc e8 80 7c 00 00 00 00 m..|.J.v...|....
*----> State Dump for Thread Id 0xf80 <----*
eax=5fff1090 ebx=00bb1e60 ecx=7c919aeb edx=7c97c0d8 esi=00dafc50 edi=00000001
eip=7c90eb94 esp=00dafc08 ebp=00dafc2c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Support.com\bin\FULLSOFT.DLL -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00dafc2c 67c96778 00dafc50 00000000 00000000 ntdll!KiFastSystemCallRet
7c801d77 087d83ec 74565300 e2f06814 75ff7c80 FULLSOFT+0x26778
8b55ff8b 00000000 00000000 00000000 00000000 0x87d83ec
*----> Raw Stack Dump <----*
0000000000dafc08 9b 91 d4 77 85 ea d6 77 - 50 fc da 00 00 00 00 00 ...w...wP.......
0000000000dafc18 00 00 00 00 00 00 00 00 - 60 1e bb 00 01 00 00 00 ........`.......
0000000000dafc28 45 ea d6 77 77 1d 80 7c - 78 67 c9 67 50 fc da 00 E..ww..|xg.gP...
0000000000dafc38 00 00 00 00 00 00 00 00 - 00 00 00 00 6d 05 91 7c ............m..|
0000000000dafc48 60 1e bb 00 b4 ff da 00 - 00 00 00 00 14 00 00 00 `...............
0000000000dafc58 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
0000000000dafc68 00 00 00 00 43 3a 5c 50 - 72 6f 67 72 61 6d 20 46 ....C:\Program F
0000000000dafc78 69 6c 65 73 5c 53 75 70 - 70 6f 72 74 2e 63 6f 6d iles\Support.com
0000000000dafc88 5c 62 69 6e 5c 73 64 63 - 69 64 6c 65 2e 64 6c 6c \bin\sdcidle.dll
0000000000dafc98 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000dafca8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000dafcb8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000dafcc8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000dafcd8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000dafce8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000dafcf8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000dafd08 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000dafd18 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000dafd28 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000dafd38 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xc78 <----*
eax=000000c0 ebx=00000000 ecx=00000000 edx=7ffdec00 esi=00000000 edi=00000000
eip=7c90eb94 esp=0169ff9c ebp=0169ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0169ffb4 7c80b50b 00000000 00000000 00000000 ntdll!KiFastSystemCallRet
0169ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000169ff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff 69 01 \..|.y.|......i.
000000000169ffac 00 00 00 00 00 00 00 80 - ec ff 69 01 0b b5 80 7c ..........i....|
000000000169ffbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000169ffcc 00 c0 fd 7f 00 46 fc 82 - c0 ff 69 01 38 8c 64 82 .....F....i.8.d.
000000000169ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
000000000169ffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
000000000169fffc 00 00 00 00 ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a000c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a001c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a002c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a003c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a004c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a005c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a006c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a007c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a008c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a009c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a00ac ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a00bc ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
00000000016a00cc ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
*----> State Dump for Thread Id 0xe5c <----*
eax=001aee34 ebx=00000000 ecx=7ffda000 edx=001aee34 esi=001a2db0 edi=001a2e54
eip=7c90eb94 esp=01ecfe1c ebp=01ecff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01ecff80 77e76c22 01ecffa8 77e76a3b 001a2db0 ntdll!KiFastSystemCallRet
01ecff88 77e76a3b 001a2db0 00000000 0013d61c RPCRT4!I_RpcBCacheFree+0x5ea
01ecffa8 77e76c0a 00165230 01ecffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
01ecffb4 7c80b50b 0019f630 00000000 0013d61c RPCRT4!I_RpcBCacheFree+0x5d2
01ecffec 00000000 77e76bf0 0019f630 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001ecfe1c 99 e3 90 7c 03 67 e7 77 - d8 02 00 00 70 ff ec 01 ...|.g.w....p...
0000000001ecfe2c 00 00 00 00 30 70 20 00 - 54 ff ec 01 b0 cc 57 80 ....0p .T.....W.
0000000001ecfe3c 50 c2 5a 82 68 c2 5a 82 - cc 1b c0 f4 50 c2 5a 82 P.Z.h.Z.....P.Z.
0000000001ecfe4c 54 c2 5a 82 02 ae fc 82 - 00 00 56 80 ff 03 1f 00 T.Z.......V.....
0000000001ecfe5c 70 ae fc 82 00 fc e0 ff - d0 1b c0 f4 ba 94 34 f8 p.............4.
0000000001ecfe6c 01 00 00 00 f8 fc c8 82 - 07 00 00 00 aa 03 00 00 ................
0000000001ecfe7c a9 03 00 00 90 31 e5 82 - dc ff 17 c0 00 00 00 00 .....1..........
0000000001ecfe8c 07 00 00 00 07 00 00 00 - b0 3c be e3 d8 34 58 e2 .........<...4X.
0000000001ecfe9c 68 c2 5a 82 02 00 00 00 - d8 f0 e5 e3 50 c2 5a 82 h.Z.........P.Z.
0000000001ecfeac 68 c2 5a 82 c4 1b c0 f4 - 73 77 56 80 f8 83 4a e2 h.Z.....swV...J.
0000000001ecfebc ac 02 00 00 ff 03 1f 00 - f8 83 4a e2 f8 83 4a e2 ..........J...J.
0000000001ecfecc ac 02 00 00 00 00 00 00 - 10 84 4a e2 58 b5 04 e1 ..........J.X...
0000000001ecfedc 51 c2 5a 82 e0 1b c0 f4 - 9a 78 56 80 f8 83 4a e2 Q.Z......xV...J.
0000000001ecfeec f8 83 4a e2 10 32 e5 82 - 00 00 00 00 02 00 00 00 ..J..2..........
0000000001ecfefc e4 1b c0 f4 cc 44 57 80 - d4 1c c0 f4 a1 43 57 80 .....DW......CW.
0000000001ecff0c 90 31 e5 82 00 00 00 00 - 64 e4 8c 82 24 1c c0 f4 .1......d...$...
0000000001ecff1c 62 c8 4d 80 6a c8 4d 80 - 34 e4 8c 82 c8 e2 8c 82 b.M.j.M.4.......
0000000001ecff2c fc e2 8c 82 80 ff ec 01 - 99 66 e7 77 4c ff ec 01 .........f.wL...
0000000001ecff3c a9 66 e7 77 ed 10 90 7c - d8 86 1c 00 30 f6 19 00 .f.w...|....0...
0000000001ecff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0xc84 <----*
eax=774f319a ebx=00007530 ecx=7ffdf000 edx=00000000 esi=00000000 edi=01fcff50
eip=7c90eb94 esp=01fcff20 ebp=01fcff78 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr Args to Child
01fcff78 7c802451 0000ea60 00000000 01fcffb4 ntdll!KiFastSystemCallRet
01fcff88 774f2fcb 0000ea60 001a2780 774f314d kernel32!Sleep+0xf
01fcffb4 7c80b50b 001a2780 7c910945 7c91094e ole32!StringFromGUID2+0x2d1
01fcffec 00000000 774f319a 001a2780 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001fcff20 5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff fc 01 \..|.#.|....P...
0000000001fcff30 50 25 80 7c f0 56 60 77 - 30 75 00 00 14 00 00 00 P%.|.V`w0u......
0000000001fcff40 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
0000000001fcff50 00 ba 3c dc ff ff ff ff - 64 fd fc 01 50 ff fc 01 ..<.....d...P...
0000000001fcff60 30 ff fc 01 64 fd fc 01 - dc ff fc 01 f3 99 83 7c 0...d..........|
0000000001fcff70 58 24 80 7c 00 00 00 00 - 88 ff fc 01 51 24 80 7c X$.|........Q$.|
0000000001fcff80 60 ea 00 00 00 00 00 00 - b4 ff fc 01 cb 2f 4f 77 `............/Ow
0000000001fcff90 60 ea 00 00 80 27 1a 00 - 4d 31 4f 77 00 00 00 00 `....'..M1Ow....
0000000001fcffa0 45 09 91 7c 80 27 1a 00 - 00 00 4e 77 b5 31 4f 77 E..|.'....Nw.1Ow
0000000001fcffb0 4e 09 91 7c ec ff fc 01 - 0b b5 80 7c 80 27 1a 00 N..|.......|.'..
0000000001fcffc0 45 09 91 7c 4e 09 91 7c - 80 27 1a 00 00 90 fd 7f E..|N..|.'......
0000000001fcffd0 00 46 fc 82 c0 ff fc 01 - 48 d8 a2 82 ff ff ff ff .F......H.......
0000000001fcffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000001fcfff0 00 00 00 00 9a 31 4f 77 - 80 27 1a 00 00 00 00 00 .....1Ow.'......
0000000001fd0000 c8 00 00 00 8f 01 00 00 - ff ee ff ee 02 10 00 00 ................
0000000001fd0010 00 00 00 00 00 fe 00 00 - 00 00 10 00 00 20 00 00 ............. ..
0000000001fd0020 00 02 00 00 00 20 00 00 - 02 01 00 00 ff ef fd 7f ..... ..........
0000000001fd0030 10 00 08 06 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001fd0040 00 00 00 00 98 05 fd 01 - 0f 00 00 00 f8 ff ff ff ................
0000000001fd0050 50 00 fd 01 50 00 fd 01 - 40 06 fd 01 00 00 00 00 P...P...@.......
*----> State Dump for Thread Id 0xe24 <----*
eax=0019de4c ebx=0016c728 ecx=7ffd8000 edx=00073d5e esi=7fffffff edi=ffffffff
eip=7c90eb94 esp=0216fad0 ebp=0216fb0c iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\mswsock.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WS2_32.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WININET.dll -
ChildEBP RetAddr Args to Child
0216fb0c 71a55fa7 00000350 00000378 00000000 ntdll!KiFastSystemCallRet
0216fc00 71ab2e67 00000001 0216fe80 0216fc78 mswsock+0x5fa7
0216fc50 771d71bf 00000001 0216fe80 0216fc78 WS2_32!select+0xa7
0216ffac 771d92f3 0216ffec 7c80b50b 0019de40 WININET!GetUrlCacheEntryInfoExW+0x88d
0216ffb4 7c80b50b 0019de40 71ab1404 0000005d WININET!InternetSetStatusCallback+0x1d7
0216ffec 00000000 771d92e6 0019de40 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000216fad0 c0 e9 90 7c 33 40 a5 71 - 50 03 00 00 01 00 00 00 ...|
[email protected].......
000000000216fae0 f8 fa 16 02 b0 fb 16 02 - 80 fe 16 02 a0 fb 16 02 ................
000000000216faf0 b6 f7 e4 b0 8b b5 c4 01 - ff ff ff ff ff ff ff 7f ................
000000000216fb00 28 c7 16 00 00 00 00 00 - 00 00 00 00 00 fc 16 02 (...............
000000000216fb10 a7 5f a5 71 50 03 00 00 - 78 03 00 00 00 00 00 00 ._.qP...x.......
000000000216fb20 04 00 00 00 7c fd 16 02 - 98 c4 16 00 78 fc 16 02 ....|.......x...
000000000216fb30 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000216fb40 01 00 00 00 80 0f 05 fd - ff ff ff ff 00 00 15 00 ................
000000000216fb50 05 10 90 7c 04 00 00 00 - 40 fb 16 02 00 00 00 00 ...|....@.......
000000000216fb60 00 00 00 00 00 00 01 00 - 04 00 00 00 00 00 15 00 ................
000000000216fb70 34 fc 16 02 ec fb 16 02 - 18 ee 90 7c 1c 00 00 00 4..........|....
000000000216fb80 28 c7 16 00 bc fb 16 02 - 78 fc 16 02 7c fd 16 02 (.......x...|...
000000000216fb90 00 00 00 00 a0 fb 16 02 - 00 00 00 00 00 00 00 00 ................
000000000216fba0 80 0f 05 fd ff ff ff ff - 01 00 00 00 00 00 15 00 ................
000000000216fbb0 78 03 00 00 19 00 00 00 - 24 82 1c 00 d0 7c 63 04 x.......$....|c.
000000000216fbc0 05 10 90 7c fc fb 16 02 - 96 e3 1b 77 b1 e3 1b 77 ...|.......w...w
000000000216fbd0 24 82 1c 00 b8 fb 16 02 - 05 10 90 7c dc ff 16 02 $..........|....
000000000216fbe0 f3 99 83 7c f2 73 00 00 - 24 fb 16 02 0c 15 aa 71 ...|.s..$......q
000000000216fbf0 40 fc 16 02 c8 71 a7 71 - 68 2e a5 71 ff ff ff ff @....q.qh..q....
000000000216fc00 50 fc 16 02 67 2e ab 71 - 01 00 00 00 80 fe 16 02 P...g..q........
*----> State Dump for Thread Id 0xb3c <----*
eax=02de0f70 ebx=00000000 ecx=7ffd7000 edx=02de0f70 esi=001a2db0 edi=00000100
eip=7c90eb94 esp=0226fe1c ebp=0226ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0226ff80 77e76c22 0226ffa8 77e76a3b 001a2db0 ntdll!KiFastSystemCallRet
0226ff88 77e76a3b 001a2db0 00e803a0 01a50178 RPCRT4!I_RpcBCacheFree+0x5ea
0226ffa8 77e76c0a 00165230 0226ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0226ffb4 7c80b50b 001ad960 00e803a0 01a50178 RPCRT4!I_RpcBCacheFree+0x5d2
0226ffec 00000000 77e76bf0 001ad960 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000226fe1c 99 e3 90 7c 03 67 e7 77 - d8 02 00 00 70 ff 26 02 ...|.g.w....p.&.
000000000226fe2c 00 00 00 00 48 db 1c 00 - 54 ff 26 02 18 b2 63 82 ....H...T.&...c.
000000000226fe3c 08 60 62 82 20 60 62 82 - cc 3b fa f3 08 60 62 82 .`b. `b..;...`b.
000000000226fe4c 0c 60 62 82 70 ae fc 82 - 37 47 56 80 ff 03 1f 00 .`b.p...7GV.....
000000000226fe5c 70 ae fc 82 00 fc e0 ff - 0e c1 4e 80 fc 07 30 c0 p.........N...0.
000000000226fe6c 04 3c fa f3 86 bf 4e 80 - 00 b0 fd 7f b2 03 00 00 .<....N.........
000000000226fe7c b1 03 00 00 a8 c0 75 82 - 20 b0 63 82 01 b0 63 82 ......u. .c...c.
000000000226fe8c 00 00 00 00 6c ff 1f c0 - a0 3b fa f3 00 5a fc 82 ....l....;...Z..
000000000226fe9c 20 60 62 82 00 00 00 00 - 05 00 00 00 08 60 62 82 `b..........`b.
000000000226feac 20 60 62 82 c4 3b fa f3 - 73 77 56 80 f8 83 4a e2 `b..;..swV...J.
000000000226febc 3c 03 00 00 ff 03 1f 00 - f8 83 4a e2 f8 83 4a e2 <.........J...J.
000000000226fecc 3c 03 00 00 00 00 00 00 - 10 84 4a e2 78 b6 04 e1 <.........J.x...
000000000226fedc 09 60 62 82 e0 3b fa f3 - 9a 78 56 80 f8 83 4a e2 .`b..;...xV...J.
000000000226feec f8 83 4a e2 10 32 e5 82 - 00 00 00 00 02 00 00 00 ..J..2..........
000000000226fefc e4 3b fa f3 cc 44 57 80 - d4 3c fa f3 a1 43 57 80 .;...DW..<...CW.
000000000226ff0c 90 31 e5 82 00 00 00 00 - 4c ac e2 82 24 3c fa f3 .1......L...$<..
000000000226ff1c 62 c8 4d 80 6a c8 4d 80 - 1c ac e2 82 b0 aa e2 82 b.M.j.M.........
000000000226ff2c e4 aa e2 82 80 ff 26 02 - 99 66 e7 77 4c ff 26 02 ......&..f.wL.&.
000000000226ff3c a9 66 e7 77 ed 10 90 7c - 38 d9 1a 00 60 d9 1a 00 .f.w...|8...`...
000000000226ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0xaf8 <----*
eax=0465b550 ebx=0236fee0 ecx=b2c400b8 edx=b2c400b9 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=0236feb8 ebp=0236ff54 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0236ff54 7c809c86 00000002 0236ffa8 00000000 ntdll!KiFastSystemCallRet
0236ff70 771b18fa 00000002 0236ffa8 00000000 kernel32!WaitForMultipleObjects+0x18
0236ffb0 771cdb0d 7c80b50b 001ad7f8 7c9106eb WININET+0x18fa
0236ffec 00000000 771cdb02 001ad7f8 00000000 WININET!InternetLockRequestFile+0x13d9
*----> Raw Stack Dump <----*
000000000236feb8 ab e9 90 7c f2 94 80 7c - 02 00 00 00 e0 fe 36 02 ...|...|......6.
000000000236fec8 01 00 00 00 00 00 00 00 - 14 ff 36 02 eb 06 91 7c ..........6....|
000000000236fed8 f8 d7 1a 00 00 d7 1a 00 - 48 04 00 00 44 04 00 00 ........H...D...
000000000236fee8 90 90 23 77 a8 90 23 77 - 14 00 00 00 01 00 00 00 ..#w..#w........
000000000236fef8 00 00 00 00 00 00 00 00 - 14 00 00 00 01 00 00 00 ................
000000000236ff08 00 00 00 00 00 00 00 00 - 10 00 00 00 00 5d 1e ee .............]..
000000000236ff18 ff ff ff ff e4 fe 36 02 - 00 f0 fd 7f 00 60 fd 7f ......6......`..
000000000236ff28 f3 99 83 7c 14 ff 36 02 - e0 fe 36 02 00 26 80 7c ...|..6...6..&.|
000000000236ff38 02 00 00 00 d4 fe 36 02 - ff ff ff ff dc ff 36 02 ......6.......6.
000000000236ff48 f3 99 83 7c 90 95 80 7c - 00 00 00 00 70 ff 36 02 ...|...|....p.6.
000000000236ff58 86 9c 80 7c 02 00 00 00 - a8 ff 36 02 00 00 00 00 ...|......6.....
000000000236ff68 30 75 00 00 00 00 00 00 - b0 ff 36 02 fa 18 1b 77 0u........6....w
000000000236ff78 02 00 00 00 a8 ff 36 02 - 00 00 00 00 30 75 00 00 ......6.....0u..
000000000236ff88 24 fc 79 01 c0 71 20 00 - 03 01 00 00 00 00 00 00 $.y..q .........
000000000236ff98 00 00 00 00 00 00 00 00 - 44 04 00 00 63 51 20 07 ........D...cQ .
000000000236ffa8 48 04 00 00 44 04 00 00 - ec ff 36 02 0d db 1c 77 H...D.....6....w
000000000236ffb8 0b b5 80 7c f8 d7 1a 00 - eb 06 91 7c 24 fc 79 01 ...|.......|$.y.
000000000236ffc8 f8 d7 1a 00 00 60 fd 7f - 00 46 fc 82 c0 ff 36 02 .....`...F....6.
000000000236ffd8 08 39 bb 82 ff ff ff ff - f3 99 83 7c 18 b5 80 7c .9.........|...|
000000000236ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 02 db 1c 77 ...............w
*----> State Dump for Thread Id 0xf74 <----*
eax=00000000 ebx=c0000000 ecx=0260ff7c edx=7c90eb94 esi=00000000 edi=71a87558
eip=7c90eb94 esp=0260ff7c ebp=0260ffb4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0260ffb4 7c80b50b 71a5d8ec 0179f910 7c90ee18 ntdll!KiFastSystemCallRet
0260ffec 00000000 71a5d5af 001a7128 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000260ff7c 1b e3 90 7c 09 d6 a5 71 - a8 04 00 00 bc ff 60 02 ...|...q......`.
000000000260ff8c b0 ff 60 02 a4 ff 60 02 - 50 d6 a5 71 10 f9 79 01 ..`...`.P..q..y.
000000000260ff9c 18 ee 90 7c 28 71 1a 00 - 00 00 00 00 00 00 00 00 ...|(q..........
000000000260ffac 00 00 a5 71 c8 b0 20 00 - ec ff 60 02 0b b5 80 7c ...q.. ...`....|
000000000260ffbc ec d8 a5 71 10 f9 79 01 - 18 ee 90 7c 28 71 1a 00 ...q..y....|(q..
000000000260ffcc 00 40 fd 7f 00 46 fc 82 - c0 ff 60 02 b8 a6 c1 82
[email protected]....`.....
000000000260ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
000000000260ffec 00 00 00 00 00 00 00 00 - af d5 a5 71 28 71 1a 00 ...........q(q..
000000000260fffc 00 00 00 00 b7 00 61 02 - 05 00 00 00 07 00 00 00 ......a.........
000000000261000c 00 00 00 0a 00 00 00 00 - 00 00 00 00 00 06 00 00 ................
000000000261001c 00 00 00 06 00 00 00 00 - 00 1f 00 00 00 00 00 00 ................
000000000261002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000261003c 00 00 00 00 00 00 00 00 - 01 01 0c 00 00 00 00 00 ................
000000000261004c 00 00 00 00 00 00 01 0a - 00 00 00 00 00 00 00 00 ................
000000000261005c 00 01 03 00 00 00 01 01 - 02 00 01 00 00 00 00 00 ................
000000000261006c 00 00 00 00 04 00 00 00 - 03 00 00 00 00 00 00 00 ................
000000000261007c 00 00 00 00 03 00 00 04 - 00 00 00 03 00 00 10 00 ................
000000000261008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 05 00 ................
000000000261009c 00 00 00 01 05 00 00 00 - 00 00 00 01 00 00 00 00 ................
00000000026100ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xd10 <----*
eax=00000001 ebx=7c901005 ecx=00000000 edx=b0910014 esi=00000510 edi=00000000
eip=7c90eb94 esp=02b0ff14 ebp=02b0ff78 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
02b0ff78 7c802542 00000510 000927c0 00000000 ntdll!KiFastSystemCallRet
02b0ff8c 7d5247d5 00000510 000927c0 7726d698 kernel32!WaitForSingleObject+0x12
02b0ffb4 7c80b50b 02612e20 7726d698 7726d664 mshtml+0x847d5
02b0ffec 00000000 7d572e3f 02612e20 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000002b0ff14 c0 e9 90 7c db 25 80 7c - 10 05 00 00 00 00 00 00 ...|.%.|........
0000000002b0ff24 48 ff b0 02 00 00 00 00 - 20 2e 61 02 05 10 90 7c H....... .a....|
0000000002b0ff34 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002b0ff44 10 00 00 00 00 44 5f 9a - fe ff ff ff 00 f0 fd 7f .....D_.........
0000000002b0ff54 00 f0 fa 7f 48 ff b0 02 - a0 b9 70 02 28 ff b0 02 ....H.....p.(...
0000000002b0ff64 3f bf 4f 7d dc ff b0 02 - f3 99 83 7c 08 26 80 7c ?.O}.......|.&.|
0000000002b0ff74 00 00 00 00 8c ff b0 02 - 42 25 80 7c 10 05 00 00 ........B%.|....
0000000002b0ff84 c0 27 09 00 00 00 00 00 - b4 ff b0 02 d5 47 52 7d .'...........GR}
0000000002b0ff94 10 05 00 00 c0 27 09 00 - 98 d6 26 77 20 2e 61 02 .....'....&w .a.
0000000002b0ffa4 20 2e 61 02 7a 2e 57 7d - 64 d6 26 77 4c 2e 57 7d .a.z.W}d.&wL.W}
0000000002b0ffb4 ec ff b0 02 0b b5 80 7c - 20 2e 61 02 98 d6 26 77 .......| .a...&w
0000000002b0ffc4 64 d6 26 77 20 2e 61 02 - 00 f0 fa 7f 00 46 fc 82 d.&w .a......F..
0000000002b0ffd4 c0 ff b0 02 08 da 5a 82 - ff ff ff ff f3 99 83 7c ......Z........|
0000000002b0ffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
0000000002b0fff4 3f 2e 57 7d 20 2e 61 02 - 00 00 00 00 00 00 00 00 ?.W} .a.........
0000000002b10004 9f 00 13 00 10 00 90 01 - 17 00 b0 01 ff ff ff 00 ................
0000000002b10014 ff ff ff 00 00 00 00 00 - 00 00 00 00 ff ff ff 00 ................
0000000002b10024 ff ff ff 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002b10034 01 00 00 00 0d 02 01 01 - 00 00 00 00 00 00 00 00 ................
0000000002b10044 00 00 00 00 00 00 00 00 - 02 00 00 00 01 00 00 00 ................
*----> State Dump for Thread Id 0x128 <----*
eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=02d7fcec ebp=02d7ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
02d7ffb4 7c80b50b 00000000 00150000 00000000 ntdll!KiFastSystemCallRet
02d7ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000002d7fcec ab e9 90 7c d5 a0 92 7c - 15 00 00 00 30 fd d7 02 ...|...|....0...
0000000002d7fcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 15 00 ................
0000000002d7fd0c 00 00 00 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c ...........|...|
0000000002d7fd1c 74 05 00 00 28 01 00 00 - 15 00 00 00 15 00 00 00 t...(...........
0000000002d7fd2c 14 00 00 00 6c 05 00 00 - 38 00 00 00 c0 05 00 00 ....l...8.......
0000000002d7fd3c cc 05 00 00 f4 05 00 00 - 00 06 00 00 0c 06 00 00 ................
0000000002d7fd4c 2c 06 00 00 34 06 00 00 - 3c 06 00 00 48 06 00 00 ,...4...<...H...
0000000002d7fd5c 50 06 00 00 5c 06 00 00 - 68 06 00 00 74 06 00 00 P...\...h...t...
0000000002d7fd6c 7c 06 00 00 88 06 00 00 - 94 06 00 00 a0 06 00 00 |...............
0000000002d7fd7c a8 06 00 00 5c 0a 00 00 - d0 06 00 00 dc 06 00 00 ....\...........
0000000002d7fd8c e8 06 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002d7fd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002d7fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002d7fdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002d7fdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002d7fddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002d7fdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002d7fdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002d7fe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002d7fe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xf8c <----*
eax=769c8831 ebx=02f7fef4 ecx=0013c6d4 edx=0013c988 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=02f7fecc ebp=02f7ff68 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USERENV.dll -
ChildEBP RetAddr Args to Child
02f7ff68 7c809c86 00000003 76a60310 00000000 ntdll!KiFastSystemCallRet
02f7ff84 769c888d 00000003 76a60310 00000000 kernel32!WaitForMultipleObjects+0x18
02f7ffb4 7c80b50b 00000000 00000000 00000000 USERENV!UnregisterGPNotification+0x15c
02f7ffec 00000000 769c8831 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000002f7fecc ab e9 90 7c f2 94 80 7c - 03 00 00 00 f4 fe f7 02 ...|...|........
0000000002f7fedc 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f7feec b8 03 a6 76 77 9b 80 7c - d0 05 00 00 d4 05 00 00 ...vw..|........
0000000002f7fefc d8 05 00 00 c0 e9 90 7c - 1b 90 91 7c e8 05 00 00 .......|...|....
0000000002f7ff0c 00 00 00 00 00 00 00 00 - 14 00 00 00 01 00 00 00 ................
0000000002f7ff1c 00 00 00 00 00 00 00 00 - 10 00 00 00 f6 1b 80 7c ...............|
0000000002f7ff2c 00 00 00 00 00 00 00 00 - 00 f0 fd 7f 00 c0 fa 7f ................
0000000002f7ff3c 08 e0 15 00 00 00 00 00 - f4 fe f7 02 00 00 00 00 ................
0000000002f7ff4c 03 00 00 00 e8 fe f7 02 - 00 00 00 00 dc ff f7 02 ................
0000000002f7ff5c f3 99 83 7c 90 95 80 7c - 00 00 00 00 84 ff f7 02 ...|...|........
0000000002f7ff6c 86 9c 80 7c 03 00 00 00 - 10 03 a6 76 00 00 00 00 ...|.......v....
0000000002f7ff7c ff ff ff ff 00 00 00 00 - b4 ff f7 02 8d 88 9c 76 ...............v
0000000002f7ff8c 03 00 00 00 10 03 a6 76 - 00 00 00 00 ff ff ff ff .......v........
0000000002f7ff9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 9c 76 ...............v
0000000002f7ffac 03 00 00 00 00 00 00 00 - ec ff f7 02 0b b5 80 7c ...............|
0000000002f7ffbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f7ffcc 00 c0 fa 7f 00 46 fc 82 - c0 ff f7 02 48 16 6b 82 .....F......H.k.
0000000002f7ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
0000000002f7ffec 00 00 00 00 00 00 00 00 - 31 88 9c 76 00 00 00 00 ........1..v....
0000000002f7fffc 00 00 00 00 c8 00 00 00 - 9a 01 00 00 ff ee ff ee ................
*----> State Dump for Thread Id 0xf6c <----*
eax=771b3b28 ebx=00000000 ecx=00182ab0 edx=033ff934 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=033fff70 ebp=033fffb4 iopl=0 nv up ei ng nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
033fffb4 7c80b50b 00000000 02d959e8 0000001e ntdll!KiFastSystemCallRet
033fffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
00000000033fff70 1b e3 90 7c 9d 07 91 7c - 74 02 00 00 ac ff 3f 03 ...|...|t.....?.
00000000033fff80 b0 ff 3f 03 98 ff 3f 03 - a0 ff 3f 03 e8 59 d9 02 ..?...?...?..Y..
00000000033fff90 1e 00 00 00 00 00 00 00 - 00 00 00 00 b8 5c 79 04 .............\y.
00000000033fffa0 00 7c 28 e8 ff ff ff ff - 01 00 00 00 69 75 92 7c .|(.........iu.|
00000000033fffb0 88 c8 d9 02 ec ff 3f 03 - 0b b5 80 7c 00 00 00 00 ......?....|....
00000000033fffc0 e8 59 d9 02 1e 00 00 00 - 00 00 00 00 00 a0 fa 7f .Y..............
00000000033fffd0 00 46 fc 82 c0 ff 3f 03 - b0 b1 f1 82 ff ff ff ff .F....?.........
00000000033fffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
00000000033ffff0 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 ....`..|........
0000000003400000 f7 00 40 03 01 00 00 00 - 04 00 00 00 02 00 04 00 ..@.............
0000000003400010 00 00 05 00 00 00 00 04 - 00 00 00 00 00 00 00 00 ................
0000000003400020 00 00 00 00 00 00 00 04 - 00 00 00 00 00 00 00 00 ................
0000000003400030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003400040 00 04 00 00 00 09 00 00 - 00 00 00 00 00 00 01 02 ................
0000000003400050 00 09 00 00 00 00 00 00 - 00 00 02 00 04 00 00 00 ................
0000000003400060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003400070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003400080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003400090 00 00 00 00 00 00 00 00 - 00 00 00 00 04 00 00 00 ................
00000000034000a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x42c <----*
eax=6bddad26 ebx=034004dc ecx=7c910732 edx=00150000 esi=00000000 edi=034004dc
eip=7c90eb94 esp=03cfff30 ebp=03cfff5c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\System32\dxtrans.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
03cfff5c 6bddad62 00000728 03cfff84 03cfff88 ntdll!KiFastSystemCallRet
03cfffb4 7c80b50b 034004dc ffffffff 7c90fb71 dxtrans+0xad62
03cfffec 00000000 6bddad26 034004dc 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000003cfff30 1b e3 90 7c d9 cb 80 7c - 28 07 00 00 88 ff cf 03 ...|...|(.......
0000000003cfff40 74 ff cf 03 54 ff cf 03 - 00 00 00 00 71 fb 90 7c t...T.......q..|
0000000003cfff50 dc 04 40 03 dc 04 40 03 - 02 00 00 00 b4 ff cf 03 ..@...@.........
0000000003cfff60 62 ad dd 6b 28 07 00 00 - 84 ff cf 03 88 ff cf 03 b..k(...........
0000000003cfff70 8c ff cf 03 ff ff ff ff - ff ff ff ff 71 fb 90 7c ............q..|
0000000003cfff80 dc 04 40 03 01 94 13 e2 - 00 00 00 00 90 31 e5 82
[email protected]..
0000000003cfff90 dc 04 40 03 00 00 00 00 - 00 00 00 00 78 ff cf 03
[email protected]...
0000000003cfffa0 21 a8 4f 80 dc ff cf 03 - 13 4e df 6b 50 ae dd 6b !.O......N.kP..k
0000000003cfffb0 ff ff ff ff ec ff cf 03 - 0b b5 80 7c dc 04 40 03 ...........|..@.
0000000003cfffc0 ff ff ff ff 71 fb 90 7c - dc 04 40 03 00 90 fa 7f ....q..|..@.....
0000000003cfffd0 00 46 fc 82 c0 ff cf 03 - a0 1e 94 82 ff ff ff ff .F..............
0000000003cfffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000003cffff0 00 00 00 00 26 ad dd 6b - dc 04 40 03 00 00 00 00 ....&..k..@.....
0000000003d00000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003d00010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003d00020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003d00030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003d00040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003d00050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003d00060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xe4c <----*
eax=6bddad26 ebx=034004dc ecx=7c910732 edx=00150000 esi=00000000 edi=034004dc
eip=7c90eb94 esp=03dfff30 ebp=03dfff5c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
03dfff5c 6bddad62 00000728 03dfff84 03dfff88 ntdll!KiFastSystemCallRet
03dfffb4 7c80b50b 034004dc ffffffff 7c90fb71 dxtrans+0xad62
03dfffec 00000000 6bddad26 034004dc 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000003dfff30 1b e3 90 7c d9 cb 80 7c - 28 07 00 00 88 ff df 03 ...|...|(.......
0000000003dfff40 74 ff df 03 54 ff df 03 - 00 00 00 00 71 fb 90 7c t...T.......q..|
0000000003dfff50 dc 04 40 03 dc 04 40 03 - 02 00 00 00 b4 ff df 03 ..@...@.........
0000000003dfff60 62 ad dd 6b 28 07 00 00 - 84 ff df 03 88 ff df 03 b..k(...........
0000000003dfff70 8c ff df 03 ff ff ff ff - ff ff ff ff 71 fb 90 7c ............q..|
0000000003dfff80 dc 04 40 03 01 00 00 00 - 00 00 00 00 90 31 e5 82
[email protected]..
0000000003dfff90 dc 04 40 03 00 00 00 00 - 00 00 00 00 78 ff df 03
[email protected]...
0000000003dfffa0 21 a8 4f 80 dc ff df 03 - 13 4e df 6b 50 ae dd 6b !.O......N.kP..k
0000000003dfffb0 ff ff ff ff ec ff df 03 - 0b b5 80 7c dc 04 40 03 ...........|..@.
0000000003dfffc0 ff ff ff ff 71 fb 90 7c - dc 04 40 03 00 80 fa 7f ....q..|..@.....
0000000003dfffd0 00 46 fc 82 c0 ff df 03 - 90 90 f9 82 ff ff ff ff .F..............
0000000003dfffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00