Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

bsod


  • Please log in to reply

#1
keithr128

keithr128

    Member

  • Member
  • PipPipPip
  • 796 posts
can someone help decipher this message for me it is on my brother in laws laptop

i beleive it is his minidump from dr watson



Application exception occurred:
App: \??\C:\WINDOWS\system32\winlogon.exe (pid=612)
When: 4/4/2007 @ 17:52:06.375
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: TOSHIBA-USER
User Name: SYSTEM
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 6 Model 14 Stepping 8
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: Nicholas Dube

*----> Task List <----*
0 System Process
4 System
536 smss.exe
584 csrss.exe
612 winlogon.exe
656 services.exe
668 lsass.exe
828 Ati2evxx.exe
844 svchost.exe
904 svchost.exe
944 svchost.exe
1044 svchost.exe
1056 logonui.exe
1132 drwtsn32.exe
1156 svchost.exe
1288 ccSvcHst.exe

*----> Module List <----*
(0000000001000000 - 0000000001080000: \??\C:\WINDOWS\system32\winlogon.exe
(0000000020000000 - 0000000020017000: C:\WINDOWS\system32\odbcint.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\COMCTL32.dll
(00000000629c0000 - 00000000629c9000: C:\WINDOWS\system32\LPK.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(00000000723d0000 - 00000000723ec000: C:\WINDOWS\system32\WINSCARD.DLL
(0000000074320000 - 000000007435d000: C:\WINDOWS\system32\ODBC32.dll
(0000000074d90000 - 0000000074dfb000: C:\WINDOWS\system32\USP10.dll
(00000000755c0000 - 00000000755ee000: C:\WINDOWS\system32\msctfime.ime
(0000000075930000 - 000000007593a000: C:\WINDOWS\system32\PROFMAP.dll
(0000000075940000 - 0000000075948000: C:\WINDOWS\system32\NDdeApi.dll
(0000000075970000 - 0000000075a68000: C:\WINDOWS\system32\MSGINA.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\sxs.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076bb0000 - 0000000076bb5000: C:\WINDOWS\system32\sfc.dll
(0000000076bc0000 - 0000000076bcf000: C:\WINDOWS\system32\REGAPI.dll
(0000000076bf0000 - 0000000076bfb000: C:\WINDOWS\system32\PSAPI.DLL
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c60000 - 0000000076c8a000: C:\WINDOWS\system32\sfc_os.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\system32\WTSAPI32.dll
(00000000773d0000 - 00000000774d3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(00000000776c0000 - 00000000776d1000: C:\WINDOWS\system32\AUTHZ.dll
(00000000776e0000 - 0000000077703000: C:\WINDOWS\system32\SHSVCS.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll

*----> State Dump for Thread Id 0x268 <----*

eax=7ffdf000 ebx=00000000 ecx=00000000 edx=0000004c esi=00e2a518 edi=00000000
eip=27ec26e8 esp=0006f1b4 ebp=0006f1fc iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

function: <nosymbols>
No prior disassembly possible
27ec26e8 ?? ???
27ec26ea ?? ???
27ec26ec ?? ???
27ec26ee ?? ???
27ec26f0 ?? ???
27ec26f2 ?? ???
27ec26f4 ?? ???
27ec26f6 ?? ???
27ec26f8 ?? ???
FAULT ->27ec26e8 ?? ???
Error 0x00000001
27ec26ea ?? ???
27ec26ec ?? ???
27ec26ee ?? ???
27ec26f0 ?? ???
27ec26f2 ?? ???
27ec26f4 ?? ???
27ec26f6 ?? ???
27ec26f8 ?? ???
27ec26fa ?? ???
27ec26fc ?? ???

*----> Stack Back Trace <----*
*** ERROR: Module load completed but symbols could not be loaded for \??\C:\WINDOWS\system32\winlogon.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\MSGINA.dll -
ChildEBP RetAddr Args to Child
0006f1b0 063804d9 00000000 00000000 00000000 0x27ec26e8
0006f1fc 01025189 0007aee8 00000009 00000007 0x63804d9
0006f92c 77d48734 00010024 0000004c 00000009 winlogon+0x25189
0006f958 77d48816 01024e96 00010024 0000004c USER32!GetDC+0x6d
0006f9c0 77d489cd 00000000 01024e96 00010024 USER32!GetDC+0x14f
0006fa20 77d48a10 0006fa48 00000000 0006fa68 USER32!GetWindowLongW+0x127
0006fa30 75976424 0006fa48 000000bc 00e2bf10 USER32!DispatchMessageW+0xf
0006fa68 0103baa8 00000001 000000bc 00000000 MSGINA!WlxDisplayStatusMessage+0x259
0006fca4 0103c096 00000000 00000000 0000069a winlogon+0x3baa8
0006fcd8 010374ef 0007aee8 0007aee8 00072364 winlogon+0x3c096
0006fcfc 010315d5 0007aee8 7c80b6a1 00000000 winlogon+0x374ef
0006ff50 0103d4d0 01000000 00000000 00072364 winlogon+0x315d5
0006fff4 00000000 7ffd9000 000000c8 000001c1 winlogon+0x3d4d0

*----> Raw Stack Dump <----*
000000000006f1b4 d9 04 38 06 00 00 00 00 - 00 00 00 00 00 00 00 00 ..8.............
000000000006f1c4 18 a5 e2 00 fc f1 06 00 - e0 f1 06 00 00 00 00 00 ................
000000000006f1d4 04 00 95 00 eb 06 91 7c - 18 a5 e2 00 06 02 00 00 .......|........
000000000006f1e4 24 00 01 00 00 00 00 00 - e8 ae 07 00 84 06 00 00 $...............
000000000006f1f4 00 00 00 00 00 00 00 00 - 2c f9 06 00 89 51 02 01 ........,....Q..
000000000006f204 e8 ae 07 00 09 00 00 00 - 07 00 00 00 94 f9 06 00 ................
000000000006f214 96 4e 02 01 00 00 00 00 - 20 f2 06 00 54 f2 06 00 .N...... ...T...
000000000006f224 00 00 07 00 5c f2 06 00 - 00 00 07 00 24 00 01 00 ....\.......$...
000000000006f234 13 00 00 00 07 00 00 00 - 00 00 07 00 a8 8d e2 00 ................
000000000006f244 34 f2 06 00 18 ee 90 7c - 78 f4 06 00 18 ee 90 7c 4......|x......|
000000000006f254 38 07 91 7c ff ff ff ff - 32 07 91 7c ab 06 91 7c 8..|....2..|...|
000000000006f264 eb 06 91 7c 00 00 00 00 - 78 f6 06 00 00 00 00 00 ...|....x.......
000000000006f274 5c 64 e2 00 e0 f1 e7 77 - b8 97 08 00 0c 00 00 00 \d.....w........
000000000006f284 00 00 00 00 12 00 00 00 - d0 2c 97 75 00 00 00 00 .........,.u....
000000000006f294 00 00 00 00 38 00 00 00 - 20 00 00 00 20 00 00 00 ....8... ... ...
000000000006f2a4 eb 06 91 7c 5c 64 e2 00 - e8 a4 e2 00 00 00 00 00 ...|\d..........
000000000006f2b4 00 00 00 00 e1 26 97 75 - 00 00 00 00 59 06 81 7c .....&.u....Y..|
000000000006f2c4 18 00 00 00 00 30 00 00 - fc ff 10 01 20 00 00 00 .....0...... ...
000000000006f2d4 32 07 91 7c 00 00 00 00 - 98 0b 07 00 00 00 00 00 2..|............
000000000006f2e4 28 5b e2 0e 65 00 00 00 - ab 06 91 7c 1c f5 06 00 ([..e......|....

*----> State Dump for Thread Id 0x27c <----*

eax=00000201 ebx=00000000 ecx=00000210 edx=001c6605 esi=00085da8 edi=00086468
eip=7c90eb94 esp=00aafe1c ebp=00aaff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
00aaff80 77e76c22 00aaffa8 77e76a3b 00085da8 ntdll!KiFastSystemCallRet
00aaff88 77e76a3b 00085da8 7c90ee18 0006f688 RPCRT4!I_RpcBCacheFree+0x5ea
00aaffa8 77e76c0a 000859e8 00aaffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
00aaffb4 7c80b683 00085f98 7c90ee18 0006f688 RPCRT4!I_RpcBCacheFree+0x5d2
00aaffec 00000000 77e76bf0 00085f98 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000aafe1c 99 e3 90 7c 03 67 e7 77 - 48 01 00 00 70 ff aa 00 ...|.g.wH...p...
0000000000aafe2c 38 fe aa 00 68 64 08 00 - 54 ff aa 00 28 00 40 00 8...hd..T...(.@.
0000000000aafe3c 00 00 00 00 90 02 00 00 - 94 02 00 00 c4 01 00 00 ................
0000000000aafe4c 00 00 00 00 02 58 ab 89 - 01 00 73 89 bc 6b 21 ba .....X....s..k!.
0000000000aafe5c 00 59 ab 89 e8 58 ab 89 - 7c 6b 21 ba 77 33 56 80 .Y...X..|k!.w3V.
0000000000aafe6c 0c 9f 73 89 00 00 00 00 - 00 00 00 00 00 00 00 00 ..s.............
0000000000aafe7c 00 00 00 00 00 00 00 00 - 00 00 00 00 e4 58 ab 89 .............X..
0000000000aafe8c de 2d 4e 80 58 6b 21 ba - 4c 9f 73 89 0e f0 56 80 .-N.Xk!.L.s...V.
0000000000aafe9c 05 00 00 00 00 00 00 00 - 00 00 00 00 a0 6b 21 ba .............k!.
0000000000aafeac 00 aa b3 89 38 ab 54 80 - 04 00 00 00 05 00 00 00 ....8.T.........
0000000000aafebc 40 44 03 e1 60 5b 03 e1 - 00 00 00 00 00 00 c8 00 @D..`[..........
0000000000aafecc e6 96 00 e1 48 e2 98 e1 - b0 30 56 00 60 5b 03 e1 ....H....0V.`[..
0000000000aafedc 30 00 30 00 b6 96 00 e1 - 48 03 00 00 28 6c 21 ba 0.0.....H...(l!.
0000000000aafeec 6c 33 56 80 48 03 00 00 - 34 00 00 c0 98 9e 73 89 l3V.H...4.....s.
0000000000aafefc 48 e4 00 e1 3c 9f 73 89 - 68 6c 21 ba 60 e4 00 e1 H...<.s.hl!.`...
0000000000aaff0c 48 e4 00 e1 28 6c 21 ba - cc 7a 74 89 24 6c 21 ba H...(l!..zt.$l!.
0000000000aaff1c b2 c2 4d 80 ba c2 4d 80 - 9c 7a 74 89 30 79 74 89 ..M...M..zt.0yt.
0000000000aaff2c 64 79 74 89 80 ff aa 00 - 99 66 e7 77 4c ff aa 00 dyt......f.wL...
0000000000aaff3c a9 66 e7 77 ed 10 90 7c - 70 5f 08 00 98 5f 08 00 .f.w...|p_..._..
0000000000aaff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0x280 <----*

eax=77e76bf0 ebx=00000000 ecx=0006f8d4 edx=00000418 esi=00086138 edi=00000100
eip=7c90eb94 esp=00aefe1c ebp=00aeff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00aeff80 77e76c22 00aeffa8 77e76a3b 00086138 ntdll!KiFastSystemCallRet
00aeff88 77e76a3b 00086138 00000000 00085e88 RPCRT4!I_RpcBCacheFree+0x5ea
00aeffa8 77e76c0a 000859e8 00aeffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
00aeffb4 7c80b683 000862a8 00000000 00085e88 RPCRT4!I_RpcBCacheFree+0x5d2
00aeffec 00000000 77e76bf0 000862a8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000aefe1c 99 e3 90 7c 03 67 e7 77 - 28 01 00 00 70 ff ae 00 ...|.g.w(...p...
0000000000aefe2c 00 00 00 00 78 65 08 00 - 54 ff ae 00 aa 74 69 fa ....xe..T....ti.
0000000000aefe3c 2a 1b b4 f0 6a 74 6d 3e - 95 5a b4 f0 aa 77 69 2a *...jtm>.Z...wi*
0000000000aefe4c a5 5a b4 f0 a8 10 69 02 - b6 4a b4 f0 aa 51 69 6f .Z....i..J...Qio
0000000000aefe5c b4 5a a4 f0 aa 74 69 3a - 34 5a b4 f0 aa 24 69 98 .Z...ti:4Z...$i.
0000000000aefe6c 25 5a b4 f0 aa 7c 29 79 - b6 7a 34 f0 aa 75 e9 68 %Z...|)y.z4..u.h
0000000000aefe7c b4 5a b4 d0 3a 74 69 c3 - 35 52 b4 f0 aa 74 69 72 .Z..:ti.5R...tir
0000000000aefe8c a4 0a b4 f0 aa 72 69 6e - 3d 5a b4 f2 a8 64 69 62 .....rin=Z...dib
0000000000aefe9c b4 5a b5 f0 aa 21 69 8e - c4 5e b4 f0 ea 50 69 3e .Z...!i..^...Pi>
0000000000aefeac b3 5a 94 f0 aa 74 69 6f - 14 58 b4 f0 2a 74 69 2a .Z...tio.X..*ti*
0000000000aefebc ba 4b b0 f0 aa 74 69 ca - a6 5a b4 f0 aa 6e 69 2b .K...ti..Z...ni+
0000000000aefecc b6 5a b4 f0 aa 54 69 72 - 36 5a a4 f0 aa 54 69 0a .Z...Tir6Z...Ti.
0000000000aefedc 95 5a b4 f0 aa 30 69 a6 - 96 5a b4 f0 aa 74 69 83 .Z...0i..Z...ti.
0000000000aefeec b4 1a b4 f0 aa 7c 69 ab - b4 1a f4 f0 aa 34 69 af .....|i......4i.
0000000000aefefc f4 da b4 f0 aa 56 69 d7 - b7 4a b6 e0 aa 38 69 ce .....Vi..J...8i.
0000000000aeff0c b1 5a b4 f0 aa 70 6b 2a - 84 3d 47 89 24 ac 21 ba .Z...pk*.=G.$.!.
0000000000aeff1c b2 c2 4d 80 ba c2 4d 80 - 54 3d 47 89 e8 3b 47 89 ..M...M.T=G..;G.
0000000000aeff2c 1c 3c 47 89 80 ff ae 00 - 99 66 e7 77 4c ff ae 00 .<G......f.wL...
0000000000aeff3c a9 66 e7 77 ed 10 90 7c - 80 62 08 00 a8 62 08 00 .f.w...|.b...b..
0000000000aeff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0x284 <----*

eax=000000c0 ebx=00000000 ecx=4390e1fe edx=00000045 esi=00000000 edi=0006f7f0
eip=7c90eb94 esp=00b2ff9c ebp=00b2ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00b2ffb4 7c80b683 00000000 0006f7f0 00000000 ntdll!KiFastSystemCallRet
00b2ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000b2ff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff b2 00 \..|.y.|........
0000000000b2ffac 00 00 00 00 00 00 00 80 - ec ff b2 00 83 b6 80 7c ...............|
0000000000b2ffbc 00 00 00 00 f0 f7 06 00 - 00 00 00 00 00 00 00 00 ................
0000000000b2ffcc 00 b0 fd 7f 00 96 b3 89 - c0 ff b2 00 c8 d2 a2 89 ................
0000000000b2ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
0000000000b2ffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
0000000000b2fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b3000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b3001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b3002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b3003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b3004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b3005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b3006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b3007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b3008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b3009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b300ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b300bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b300cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x288 <----*

eax=7c910760 ebx=00000000 ecx=4390e1fe edx=00000045 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=00b6ff70 ebp=00b6ffb4 iopl=0 nv up ei ng nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00b6ffb4 7c80b683 00000000 0006f7f0 00000000 ntdll!KiFastSystemCallRet
00b6ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000b6ff70 1b e3 90 7c 9d 07 91 7c - 74 01 00 00 ac ff b6 00 ...|...|t.......
0000000000b6ff80 b0 ff b6 00 98 ff b6 00 - a0 ff b6 00 f0 f7 06 00 ................
0000000000b6ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b6ffa0 00 7c 28 e8 ff ff ff ff - 35 ec 6e 80 00 00 00 00 .|(.....5.n.....
0000000000b6ffb0 dc e2 90 7c ec ff b6 00 - 83 b6 80 7c 00 00 00 00 ...|.......|....
0000000000b6ffc0 f0 f7 06 00 00 00 00 00 - 00 00 00 00 00 a0 fd 7f ................
0000000000b6ffd0 00 96 b3 89 c0 ff b6 00 - c8 d2 a2 89 ff ff ff ff ................
0000000000b6ffe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000000b6fff0 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 ....`..|........
0000000000b70000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b70010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b70020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b70030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b70040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b70050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b70060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b70070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b70080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b70090 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000b700a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x28c <----*

eax=77e76bf0 ebx=00007530 ecx=0000021a edx=7c913e88 esi=00000000 edi=00000000
eip=7c90eb94 esp=00bafeac ebp=00bafed8 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00bafed8 77e772fa 00000178 00baff10 00baff00 ntdll!KiFastSystemCallRet
00baff14 77e7722b 00007530 00baff6c 00baff70 RPCRT4!I_RpcBCacheFree+0xcc2
00baff80 77e773a9 00baffa8 77e76a3b 00087378 RPCRT4!I_RpcBCacheFree+0xbf3
00baff88 77e76a3b 00087378 0006f5a0 00000008 RPCRT4!I_RpcBCacheFree+0xd71
00baffa8 77e76c0a 000859e8 00baffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
00baffb4 7c80b683 00087d70 0006f5a0 00000008 RPCRT4!I_RpcBCacheFree+0x5d2
00baffec 00000000 77e76bf0 00087d70 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000bafeac 1b e3 90 7c 46 a7 80 7c - 78 01 00 00 00 ff ba 00 ...|F..|x.......
0000000000bafebc f0 fe ba 00 d0 fe ba 00 - c8 fe ba 00 00 5d 1e ee .............]..
0000000000bafecc ff ff ff ff 00 00 00 00 - 34 31 e2 00 14 ff ba 00 ........41......
0000000000bafedc fa 72 e7 77 78 01 00 00 - 10 ff ba 00 00 ff ba 00 .r.wx...........
0000000000bafeec 08 ff ba 00 30 75 00 00 - 7a 97 80 7c 78 73 08 00 ....0u..z..|xs..
0000000000bafefc 00 00 00 00 10 00 00 00 - 78 01 00 00 00 00 00 00 ........x.......
0000000000baff0c 6b a5 4b 0f 00 00 00 00 - 80 ff ba 00 2b 72 e7 77 k.K.........+r.w
0000000000baff1c 30 75 00 00 6c ff ba 00 - 70 ff ba 00 78 ff ba 00 0u..l...p...x...
0000000000baff2c 64 ff ba 00 68 ff ba 00 - 74 ff ba 00 ed 10 90 7c d...h...t......|
0000000000baff3c 48 7d 08 00 70 7d 08 00 - 70 7d 08 00 78 01 00 00 H}..p}..p}..x...
0000000000baff4c 00 00 00 00 05 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000baff5c 00 00 00 00 30 75 00 00 - 00 00 00 00 00 00 00 00 ....0u..........
0000000000baff6c 00 00 00 00 e7 e2 6e 80 - 00 00 00 00 78 01 00 00 ......n.....x...
0000000000baff7c 00 00 00 00 88 ff ba 00 - a9 73 e7 77 a8 ff ba 00 .........s.w....
0000000000baff8c 3b 6a e7 77 78 73 08 00 - a0 f5 06 00 08 00 00 00 ;j.wxs..........
0000000000baff9c 70 7d 08 00 70 7d 08 00 - 70 7d 08 00 b4 ff ba 00 p}..p}..p}......
0000000000baffac 0a 6c e7 77 e8 59 08 00 - ec ff ba 00 83 b6 80 7c .l.w.Y.........|
0000000000baffbc 70 7d 08 00 a0 f5 06 00 - 08 00 00 00 70 7d 08 00 p}..........p}..
0000000000baffcc 00 80 fd 7f 00 96 b3 89 - c0 ff ba 00 c8 d2 a2 89 ................
0000000000baffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....

*----> State Dump for Thread Id 0x298 <----*

eax=000000c0 ebx=00000000 ecx=7c9106ab edx=7c910732 esi=00000000 edi=00000001
eip=7c90eb94 esp=00befcec ebp=00beffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00beffb4 7c80b683 00000000 7c90ee18 7c910738 ntdll!KiFastSystemCallRet
00beffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000befcec ab e9 90 7c d5 a0 92 7c - 07 00 00 00 30 fd be 00 ...|...|....0...
0000000000befcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 18 ee 90 7c ...............|
0000000000befd0c 38 07 91 7c 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c 8..|.......|...|
0000000000befd1c 98 01 00 00 98 02 00 00 - 07 00 00 00 07 00 00 00 ................
0000000000befd2c 06 00 00 00 9c 01 00 00 - a0 01 00 00 ac 01 00 00 ................
0000000000befd3c b8 01 00 00 dc 01 00 00 - 10 06 00 00 44 06 00 00 ............D...
0000000000befd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000befe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x2c4 <----*

eax=0102bda1 ebx=00000000 ecx=00790063 edx=0069006c esi=000001b4 edi=00000000
eip=7c90eb94 esp=00c6fe84 ebp=00c6fee8 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00c6fee8 7c802532 000001b4 0000ea60 00000000 ntdll!KiFastSystemCallRet
00c6fefc 0102be0e 000001b4 0000ea60 0075006f kernel32!WaitForSingleObject+0x12
00c6ffb4 7c80b683 00000000 0075006f 00200070 winlogon+0x2be0e
00c6ffec 00000000 0102bda1 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000c6fe84 c0 e9 90 7c cb 25 80 7c - b4 01 00 00 00 00 00 00 ...|.%.|........
0000000000c6fe94 b8 fe c6 00 b4 01 00 00 - 60 ea 00 00 00 00 00 00 ........`.......
0000000000c6fea4 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000c6feb4 10 00 00 00 00 ba 3c dc - ff ff ff ff 00 90 fd 7f ......<.........
0000000000c6fec4 00 50 fd 7f b8 fe c6 00 - 00 00 00 00 98 fe c6 00 .P..............
0000000000c6fed4 28 00 00 00 dc ff c6 00 - a8 9a 83 7c f8 25 80 7c (..........|.%.|
0000000000c6fee4 00 00 00 00 fc fe c6 00 - 32 25 80 7c b4 01 00 00 ........2%.|....
0000000000c6fef4 60 ea 00 00 00 00 00 00 - b4 ff c6 00 0e be 02 01 `...............
0000000000c6ff04 b4 01 00 00 60 ea 00 00 - 6f 00 75 00 70 00 20 00 ....`...o.u.p. .
0000000000c6ff14 9c 00 00 00 05 00 00 00 - 01 00 00 00 28 0a 00 00 ............(...
0000000000c6ff24 02 00 00 00 53 65 72 76 - 69 63 65 20 50 61 63 6b ....Service Pack
0000000000c6ff34 20 32 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 2..............
0000000000c6ff44 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000c6ff54 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000c6ff64 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000c6ff74 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000c6ff84 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000c6ff94 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000c6ffa4 00 00 00 00 02 00 00 00 - 00 01 01 00 0e 50 00 00 .............P..
0000000000c6ffb4 ec ff c6 00 83 b6 80 7c - 00 00 00 00 6f 00 75 00 .......|....o.u.

*----> State Dump for Thread Id 0x2f8 <----*

eax=00000051 ebx=00000003 ecx=00000010 edx=001c45e4 esi=76c629d8 edi=00000000
eip=7c90eb94 esp=00ebff64 ebp=00ebffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00ebffb4 7c80b683 00000000 75f2bd80 00da2a08 ntdll!KiFastSystemCallRet
00ebffec 00000000 76c6c86b 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000ebff64 ab e9 90 7c 39 cc c6 76 - 03 00 00 00 20 fa 10 00 ...|9..v.... ...
0000000000ebff74 00 00 00 00 01 00 00 00 - 00 00 00 00 80 bd f2 75 ...............u
0000000000ebff84 08 2a da 00 00 00 00 00 - 38 bd 12 00 9c b5 12 00 .*......8.......
0000000000ebff94 94 b5 12 00 20 fa 10 00 - 70 b5 12 00 00 00 00 00 .... ...p.......
0000000000ebffa4 38 38 da 00 30 bd 12 00 - 50 2c da 00 03 00 00 00 88..0...P,......
0000000000ebffb4 ec ff eb 00 83 b6 80 7c - 00 00 00 00 80 bd f2 75 .......|.......u
0000000000ebffc4 08 2a da 00 00 00 00 00 - 00 e0 fd 7f 00 96 b3 89 .*..............
0000000000ebffd4 c0 ff eb 00 30 5c a1 89 - ff ff ff ff a8 9a 83 7c ....0\.........|
0000000000ebffe4 90 b6 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
0000000000ebfff4 6b c8 c6 76 00 00 00 00 - 00 00 00 00 00 00 00 00 k..v............
0000000000ec0004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ec0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ec0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ec0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ec0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ec0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ec0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ec0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ec0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ec0094 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x2fc <----*

eax=76c6c5ae ebx=0012b570 ecx=00ebfc74 edx=7c910732 esi=76c629d8 edi=00e23948
eip=7c90eb94 esp=00efff4c ebp=00efffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00efffb4 7c80b683 00e23538 7c90ee18 7c910738 ntdll!KiFastSystemCallRet
00efffec 00000000 76c6c5ae 0012b570 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000efff4c ab e9 90 7c 2a c8 c6 76 - 40 00 00 00 40 38 da 00 ...|*..v@...@8..
0000000000efff5c 01 00 00 00 01 00 00 00 - 00 00 00 00 18 ee 90 7c ...............|
0000000000efff6c 38 07 91 7c 70 b5 12 00 - 00 00 00 00 01 00 00 00 8..|p...........
0000000000efff7c 02 00 00 00 04 00 00 00 - 08 00 00 00 10 00 00 00 ................
0000000000efff8c a0 2d 73 89 41 86 4f 80 - 00 00 00 00 00 00 00 00 .-s.A.O.........
0000000000efff9c 00 00 00 00 21 86 4f 80 - 9c 1c 46 b0 50 2c da 00 ....!.O...F.P,..
0000000000efffac 00 00 00 00 dc e2 90 7c - ec ff ef 00 83 b6 80 7c .......|.......|
0000000000efffbc 38 35 e2 00 18 ee 90 7c - 38 07 91 7c 70 b5 12 00 85.....|8..|p...
0000000000efffcc 00 40 fd 7f 00 96 b3 89 - c0 ff ef 00 30 5c a1 89 .@..........0\..
0000000000efffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
0000000000efffec 00 00 00 00 00 00 00 00 - ae c5 c6 76 70 b5 12 00 ...........vp...
0000000000effffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f0000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f0001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f0002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f0003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f0004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f0005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f0006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f0007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x300 <----*

eax=76c6c5ae ebx=0012b57c ecx=00ebfc74 edx=7c910732 esi=76c629d8 edi=00e23d60
eip=7c90eb94 esp=00f3ff4c ebp=00f3ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00f3ffb4 7c80b683 00e23950 7c90ee18 7c910738 ntdll!KiFastSystemCallRet
00f3ffec 00000000 76c6c5ae 0012b57c 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000f3ff4c ab e9 90 7c 2a c8 c6 76 - 40 00 00 00 48 39 da 00 ...|*..v@...H9..
0000000000f3ff5c 01 00 00 00 01 00 00 00 - 00 00 00 00 18 ee 90 7c ...............|
0000000000f3ff6c 38 07 91 7c 7c b5 12 00 - 00 00 00 00 01 00 00 00 8..||...........
0000000000f3ff7c 02 00 00 00 04 00 00 00 - 08 00 00 00 10 00 00 00 ................
0000000000f3ff8c a0 2d 73 89 41 86 4f 80 - 00 00 00 00 00 00 00 00 .-s.A.O.........
0000000000f3ff9c 00 00 00 00 21 86 4f 80 - 9c dc 45 b0 38 32 da 00 ....!.O...E.82..
0000000000f3ffac 00 00 00 00 dc e2 90 7c - ec ff f3 00 83 b6 80 7c .......|.......|
0000000000f3ffbc 50 39 e2 00 18 ee 90 7c - 38 07 91 7c 7c b5 12 00 P9.....|8..||...
0000000000f3ffcc 00 f0 fa 7f 00 96 b3 89 - c0 ff f3 00 70 e1 47 89 ............p.G.
0000000000f3ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
0000000000f3ffec 00 00 00 00 00 00 00 00 - ae c5 c6 76 7c b5 12 00 ...........v|...
0000000000f3fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f4000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f4001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f4002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f4003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f4004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f4005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f4006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f4007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x304 <----*

eax=00e24000 ebx=0012b588 ecx=00f7fd0c edx=00001000 esi=76c629d8 edi=00e24178
eip=7c90eb94 esp=00f7ff4c ebp=00f7ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00f7ffb4 7c80b683 00e23d68 7c90ee18 7c910738 ntdll!KiFastSystemCallRet
00f7ffec 00000000 76c6c5ae 0012b588 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000f7ff4c ab e9 90 7c 2a c8 c6 76 - 02 00 00 00 48 99 08 00 ...|*..v....H...
0000000000f7ff5c 01 00 00 00 01 00 00 00 - 00 00 00 00 18 ee 90 7c ...............|
0000000000f7ff6c 38 07 91 7c 88 b5 12 00 - 00 00 00 00 01 00 00 00 8..|............
0000000000f7ff7c 02 00 00 00 04 00 00 00 - 08 00 00 00 10 00 00 00 ................
0000000000f7ff8c a0 2d 73 89 41 86 4f 80 - 00 00 00 00 00 00 00 00 .-s.A.O.........
0000000000f7ff9c 00 00 00 00 21 86 4f 80 - 9c 9c 45 b0 20 38 da 00 ....!.O...E. 8..
0000000000f7ffac 00 00 00 00 dc e2 90 7c - ec ff f7 00 83 b6 80 7c .......|.......|
0000000000f7ffbc 68 3d e2 00 18 ee 90 7c - 38 07 91 7c 88 b5 12 00 h=.....|8..|....
0000000000f7ffcc 00 e0 fa 7f 00 96 b3 89 - c0 ff f7 00 30 5c a1 89 ............0\..
0000000000f7ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
0000000000f7ffec 00 00 00 00 00 00 00 00 - ae c5 c6 76 88 b5 12 00 ...........v....
0000000000f7fffc 00 00 00 00 03 00 00 00 - 60 c6 e2 00 10 00 f8 00 ........`.......
0000000000f8000c 00 00 00 00 18 00 f8 00 - 00 00 00 00 20 00 f8 00 ............ ...
0000000000f8001c 00 00 00 00 28 00 f8 00 - 00 00 00 00 30 00 f8 00 ....(.......0...
0000000000f8002c 00 00 00 00 38 00 f8 00 - 00 00 00 00 40 00 f8 00 ....8.......@...
0000000000f8003c 00 00 00 00 48 00 f8 00 - 00 00 00 00 50 00 f8 00 ....H.......P...
0000000000f8004c 00 00 00 00 58 00 f8 00 - 00 00 00 00 60 00 f8 00 ....X.......`...
0000000000f8005c 00 00 00 00 68 00 f8 00 - 00 00 00 00 70 00 f8 00 ....h.......p...
0000000000f8006c 00 00 00 00 78 00 f8 00 - 00 00 00 00 80 00 f8 00 ....x...........
0000000000f8007c 00 00 00 00 88 00 f8 00 - 00 00 00 00 90 00 f8 00 ................

*----> State Dump for Thread Id 0x380 <----*

eax=0000c9d2 ebx=00000000 ecx=76a60120 edx=769c1dbc esi=00085da8 edi=00e26200
eip=7c90eb94 esp=00c2fe1c ebp=00c2ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00c2ff80 77e76c22 00c2ffa8 77e76a3b 00085da8 ntdll!KiFastSystemCallRet
00c2ff88 77e76a3b 00085da8 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
00c2ffa8 77e76c0a 000859e8 00c2ffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
00c2ffb4 7c80b683 0008a1f8 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
00c2ffec 00000000 77e76bf0 0008a1f8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000c2fe1c 99 e3 90 7c 03 67 e7 77 - 48 01 00 00 70 ff c2 00 ...|.g.wH...p...
0000000000c2fe2c 38 fe c2 00 00 62 e2 00 - 54 ff c2 00 58 00 70 00 8....b..T...X.p.
0000000000c2fe3c 00 00 00 00 90 02 00 00 - 94 02 00 00 f2 01 00 00 ................
0000000000c2fe4c 00 00 00 00 02 3b 0d ae - 01 00 4e 80 e2 02 00 00 .....;....N.....
0000000000c2fe5c e8 f7 71 89 00 e0 fa 7f - fc 07 30 c0 b8 fe 1f c0 ..q.......0.....
0000000000c2fe6c e2 02 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000c2fe7c 00 00 00 00 00 00 00 00 - 00 00 00 00 7e b0 4e 80 ............~.N.
0000000000c2fe8c fc 07 30 c0 28 3c 0d ae - f6 ae 4e 80 00 e0 fa 7f ..0.(<....N.....
0000000000c2fe9c 00 00 00 00 00 00 00 00 - 88 45 73 89 f0 f5 71 89 .........Es...q.
0000000000c2feac 01 f6 71 89 00 00 00 00 - b8 fe 1f c0 00 00 00 00 ..q.............
0000000000c2febc 00 00 00 00 ff ff a0 00 - 00 00 04 00 0f 0a 00 00 ................
0000000000c2fecc bc f6 71 89 f0 f5 71 89 - 28 3d 0d ae 00 00 00 00 ..q...q.(=......
0000000000c2fedc 00 00 a1 00 3c 3b 0d ae - f8 e2 b7 f7 ff ff ff ff ....<;..........
0000000000c2feec 90 24 4e 80 00 e0 fa 7f - ff ff ff ff 22 8b 56 80 .$N.........".V.
0000000000c2fefc ec e7 4d 80 ff ff ff ff - b8 3c 0d ae bc 3c 0d ae ..M......<...<..
0000000000c2ff0c 00 80 00 00 14 3d 0d ae - 74 6c 97 89 24 3c 0d ae .....=..tl..$<..
0000000000c2ff1c b2 c2 4d 80 ba c2 4d 80 - 44 6c 97 89 d8 6a 97 89 ..M...M.Dl...j..
0000000000c2ff2c 0c 6b 97 89 80 ff c2 00 - 99 66 e7 77 4c ff c2 00 .k.......f.wL...
0000000000c2ff3c a9 66 e7 77 ed 10 90 7c - d8 5e e2 00 f8 a1 08 00 .f.w...|.^......
0000000000c2ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0x428 <----*

eax=759726e1 ebx=00e2a4e8 ecx=00000000 edx=00000000 esi=00e2a4e8 edi=7c9106eb
eip=7c90eb94 esp=0110ff4c ebp=0110ff78 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0110ff78 75972754 00000658 0110ff9c 0110ff98 ntdll!KiFastSystemCallRet
0110ffa4 759726f2 7c9106eb 00e2645c 0110ffec MSGINA!Ordinal19+0x9de
0110ffb4 7c80b683 00e2a4e8 7c9106eb 00e2645c MSGINA!Ordinal19+0x97c
0110ffec 00000000 759726e1 00e2a4e8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000110ff4c 1b e3 90 7c 46 a7 80 7c - 58 06 00 00 98 ff 10 01 ...|F..|X.......
000000000110ff5c 90 ff 10 01 70 ff 10 01 - 00 00 00 00 00 00 00 00 ....p...........
000000000110ff6c 58 53 4e 80 00 00 00 00 - 06 00 00 00 a4 ff 10 01 XSN.............
000000000110ff7c 54 27 97 75 58 06 00 00 - 9c ff 10 01 98 ff 10 01 T'.uX...........
000000000110ff8c a0 ff 10 01 ff ff ff ff - e8 a4 e2 00 00 00 00 00 ................
000000000110ff9c 06 00 00 00 20 04 00 00 - b4 ff 10 01 f2 26 97 75 .... ........&.u
000000000110ffac eb 06 91 7c 5c 64 e2 00 - ec ff 10 01 83 b6 80 7c ...|\d.........|
000000000110ffbc e8 a4 e2 00 eb 06 91 7c - 5c 64 e2 00 e8 a4 e2 00 .......|\d......
000000000110ffcc 00 d0 fa 7f 00 96 b3 89 - c0 ff 10 01 20 ef ad 89 ............ ...
000000000110ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
000000000110ffec 00 00 00 00 00 00 00 00 - e1 26 97 75 e8 a4 e2 00 .........&.u....
000000000110fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000111000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000111001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000111002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000111003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000111004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000111005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000111006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000111007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x42c <----*

eax=759a36d0 ebx=0114fe94 ecx=7c809ff5 edx=00030000 esi=00000000 edi=7ffd9000
eip=7c90eb94 esp=0114fe6c ebp=0114ff08 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0114ff08 77d495f9 00000002 0114ff30 00000000 ntdll!KiFastSystemCallRet
0114ff64 75975a6d 00000001 0114ffa8 ffffffff USER32!GetLastInputInfo+0x105
0114ffb4 7c80b683 000bd048 00000000 00000000 MSGINA!WlxActivateUserShell+0x2120
0114ffec 00000000 759759df 000bd048 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000114fe6c ab e9 90 7c e2 94 80 7c - 02 00 00 00 94 fe 14 01 ...|...|........
000000000114fe7c 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000114fe8c 02 00 00 00 04 00 00 00 - 78 06 00 00 84 06 00 00 ........x.......
000000000114fe9c 14 00 00 00 01 00 00 00 - 78 06 00 00 00 00 00 00 ........x.......
000000000114feac 10 00 00 00 00 00 00 00 - 14 00 00 00 01 00 00 00 ................
000000000114febc 00 00 00 00 00 00 00 00 - 10 00 00 00 50 2d 58 00 ............P-X.
000000000114fecc 2c ff 14 01 67 04 d7 77 - 00 90 fd 7f 00 c0 fa 7f ,...g..w........
000000000114fedc 2a 88 d4 77 00 00 00 00 - 94 fe 14 01 e2 41 d5 77 *..w.........A.w
000000000114feec 02 00 00 00 88 fe 14 01 - 00 00 00 00 dc ff 14 01 ................
000000000114fefc a8 9a 83 7c d8 95 80 7c - 00 00 00 00 64 ff 14 01 ...|...|....d...
000000000114ff0c f9 95 d4 77 02 00 00 00 - 30 ff 14 01 00 00 00 00 ...w....0.......
000000000114ff1c ff ff ff ff 00 00 00 00 - 45 96 d4 77 48 d0 0b 00 ........E..wH...
000000000114ff2c ff 05 00 00 78 06 00 00 - 84 06 00 00 00 c0 fa 7f ....x...........
000000000114ff3c 2c ff 14 01 02 01 00 00 - 0c ff 14 01 00 00 00 00 ,...............
000000000114ff4c dc ff 14 01 a8 9a 83 7c - 00 00 00 00 00 00 00 00 .......|........
000000000114ff5c 00 c0 fa 7f 84 06 00 00 - b4 ff 14 01 6d 5a 97 75 ............mZ.u
000000000114ff6c 01 00 00 00 a8 ff 14 01 - ff ff ff ff ff 05 00 00 ................
000000000114ff7c 30 ff 14 01 00 00 00 00 - 00 00 00 00 48 d0 0b 00 0...........H...
000000000114ff8c 34 00 01 00 13 01 00 00 - 00 00 00 00 00 00 00 00 4...............
000000000114ff9c e9 78 00 00 93 01 00 00 - a3 01 00 00 78 06 00 00 .x..........x...
  • 0

Advertisements


#2
Fenor

Fenor

    Trusted Tech

  • Retired Staff
  • 5,236 posts
Hi keithr128!

To be honest, I don't even think employees of Microsoft could decipher that. :whistling:

Now what happened that made you get this minidump? What were you doing at the time? Some more information on the problem is what I'm trying to get at here.

Fenor
  • 0

#3
keithr128

keithr128

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 796 posts
hi fenor
thank you for trying to decipher that minidump


i believe he was watching a movie at the time, but i am not positive
and i think this is the error code c0000005
he is visiting family in rhode island until saturday so i wont have much more information until then
  • 0

#4
Fenor

Fenor

    Trusted Tech

  • Retired Staff
  • 5,236 posts
Okay. Post back with more information when he returns. :whistling:

Fenor
  • 0

#5
keithr128

keithr128

    Member

  • Topic Starter
  • Member
  • PipPipPip
  • 796 posts
Okay, so when he got back today he confirmed that one of the the error codes was c0000005.
Any information that I find points to some sort of spyware called delfin media viewer.
I will post a hijack this log tonight.

Thank You for your patience.
  • 0

#6
Fenor

Fenor

    Trusted Tech

  • Retired Staff
  • 5,236 posts
Remember that HijackThis logs can ONLY be posted in the Malware Forum so that the experts there can decipher it and give you the best course of action. Please start a new topic in that forum and include the HijackThis log in it.

If your log is deemed clean by the malware expert and you are still having problems, then please return to THIS thread and we will pursue other options to help you solve your current problem.

Fenor

Edited by Fenor, 06 May 2007 - 06:59 PM.

  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP