Jump to content

Welcome to Geeks to Go - Register now for FREE

Geeks To Go is a helpful hub, where thousands of volunteer geeks quickly serve friendly answers and support. Check out the forums and get free advice from the experts. Register now to gain access to all of our features, it's FREE and only takes one minute. Once registered and logged in, you will be able to create topics, post replies to existing threads, give reputation to your fellow members, get your own private messenger, post status updates, manage your profile and so much more.

Create Account How it Works
Photo

Windows Explorer Crashes Generating Dr Watson Erro


  • Please log in to reply

#1
lgbuxton

lgbuxton

    New Member

  • Member
  • Pip
  • 4 posts
Whenever I open windows explorer and click on a drive or folder, it freezes up my computer, a Dr Watson error is generated and the system crashes. The only thing accessible to me is to reboot the computer via Ctrl+Alt+Del in Task Manager or if it completely dies on me hit the on/off button.

Does anyone know what is causing this or knows the conflict(s) on my PC is/are please? I can't open windows explorer at all - mercy me how will I access my files

Desperately Seeking A Solution :tazz:
  • 0

Advertisements


#2
gerryf

gerryf

    Retired Staff

  • Retired Staff
  • 11,365 posts
Please go to the malware forum in my signature and follow the instructions at the top....Especially the CLICK HERE .

That will give you several steps that will help you clean up 70 percent of all problems by yourself. If at the end of the process you are still having difficulty--and you may not be-- then post a hijackthis log in THAT forum.

If you are still having problems after getting a clean bill of health from the malware expert, please return to this thread.
  • 0

#3
lgbuxton

lgbuxton

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
thank you for the tips, I didnt realise I had so much spyware on my PC.

I've followed all the instructions in the malware but I am still getting the same errors ;) :tazz: .
  • 0

#4
Irongeek

Irongeek

    banned

  • Banned
  • PipPip
  • 82 posts

Whenever I open windows explorer and click on a drive or folder, it freezes up my computer, a Dr Watson error is generated and the system crashes


What version of Windows do you have? You really should post the exact error message from DR.WATSON. To start Dr. Watson in 2000 pro, click Start, click Run, and then type drwtsn32.

You can also access DR.WATSON from System Information once opened click on 'Tools' at the top of the menu go down to DR. WATSON.

You should use System Restore and back your system up to a previous date before you started having promblems with your computer. If not, click start, run, type: sfc /scannow let this application run reboot PC. :tazz:

Edited by Irongeek, 03 June 2005 - 04:03 PM.

  • 0

#5
lgbuxton

lgbuxton

    New Member

  • Topic Starter
  • Member
  • Pip
  • 4 posts
Hello,

My OS is Windows XP Pro.

As suggested I have restored my PC to its last successfully working date and this has helped tremendously, though the response time is slow Windows Explorer doesnt freeze or crash my computer. Thank you so much for that :tazz:

I have pasted the Dr Watson error below, with the hope of combatting this problem from recurring and improving the response time

my OS is Windows XP Pro




Application exception occurred:
App: C:\WINDOWS\Explorer.EXE (pid=1424)
When: 18/05/2005 @ 23:20:38.062
Exception number: 80000007
()

*----> System Information <----*
Computer Name: O-DELL
User Name: O
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 15 Model 1 Stepping 2
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: O

*----> Task List <----*
0 System Process
4 System
364 smss.exe
436 csrss.exe
460 winlogon.exe
504 services.exe
516 lsass.exe
660 svchost.exe
760 svchost.exe
796 svchost.exe
868 svchost.exe
908 svchost.exe
984 LEXBCES.EXE
1016 spoolsv.exe
1024 LEXPPS.EXE
1196 mcvsrte.exe
1216 MPFSERVICE.exe
1320 svchost.exe
1340 wdfmgr.exe
1392 svchost.exe
1560 mcshield.exe
1652 alg.exe
1424 Explorer.EXE
1804 Dragdiag.exe
1812 dslstat.exe
1832 dslagent.exe
1840 qttask.exe
1476 mcvsshld.exe
1464 mcagent.exe
1868 mcvsescn.exe
2060 MpfTray.exe
2104 jusched.exe
2128 realsched.exe
2192 ctfmon.exe
2204 msmsgs.exe
2368 MpfAgent.exe
2472 mcvsftsn.exe
2848 firefox.exe
3088 drwtsn32.exe

*----> Module List <----*
(0000000000f30000 - 0000000000f3e000: C:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
(0000000001000000 - 00000000010ff000: C:\WINDOWS\Explorer.EXE
(00000000011b0000 - 00000000011b4000: c:\progra~1\mcafee.com\vso\ShlRes.dll
(0000000001370000 - 000000000138c000: C:\Program Files\Adobe\Acrobat 7.0\ActiveX\PDFShell.dll
(0000000001480000 - 0000000001746000: C:\WINDOWS\system32\msi.dll
(0000000001930000 - 0000000001942000: C:\PROGRA~1\ACEMEG~1\SystemS\avimszh.dll
(0000000001cb0000 - 0000000001ccd000: c:\progra~1\mcafee.com\vso\mcvsshl.dll
(0000000001da0000 - 0000000001db2000: C:\WINDOWS\system32\browselc.dll
(0000000002220000 - 00000000022db000: C:\Program Files\Spybot - Search & Destroy\SDHelper.dll
(0000000002680000 - 000000000269d000: C:\PROGRA~1\ACEMEG~1\SystemS\avizlib.dll
(00000000026a0000 - 00000000026ae000: C:\PROGRA~1\ACEMEG~1\SystemS\Qpeg32.dll
(00000000026d0000 - 00000000026e6000: C:\PROGRA~1\ACEMEG~1\SystemS\ASUS\asusasv1.dll
(0000000002710000 - 0000000002724000: C:\PROGRA~1\ACEMEG~1\SystemS\BROOKT~1\btvvc32.drv
(00000000027b0000 - 00000000027db000: C:\Program Files\WinRAR\rarext.dll
(0000000003170000 - 0000000003187000: C:\WINDOWS\system32\odbcint.dll
(00000000031e0000 - 0000000003268000: C:\WINDOWS\system32\shdoclc.dll
(0000000003c40000 - 0000000003ead000: C:\PROGRA~1\ACEMEG~1\SystemS\ASUS\asusasv2.dll
(0000000003fb0000 - 0000000004199000: C:\PROGRA~1\ACEMEG~1\SystemS\DivX\DivX511.dll
(00000000070d0000 - 000000000710a000: C:\WINDOWS\system32\WMASF.DLL
(00000000085c0000 - 00000000085d5000: C:\WINDOWS\system32\wmpshell.dll
(00000000086d0000 - 0000000008916000: C:\WINDOWS\system32\wmvcore.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 000000001001c000: c:\progra~1\mcafee.com\vso\McVSSkt.dll
(0000000014c00000 - 0000000014c4f000: C:\PROGRA~1\ACEMEG~1\SystemS\Aware\icmw_32.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(0000000032520000 - 0000000032532000: C:\Program Files\Microsoft Office\Office10\msohev.dll
(000000004ec50000 - 000000004edf3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b0a0000 - 000000005b0a7000: C:\WINDOWS\system32\umdmxfrm.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\System32\themeui.dll
(000000005cad0000 - 000000005caf7000: C:\WINDOWS\System32\shmedia.dll
(000000005cb00000 - 000000005cb6e000: C:\WINDOWS\System32\shimgvw.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005cd70000 - 000000005cd77000: C:\WINDOWS\system32\serwvdrv.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl32.dll
(000000005edd0000 - 000000005ede7000: C:\WINDOWS\system32\olepro32.dll
(000000005fc10000 - 000000005fc43000: C:\WINDOWS\System32\msutb.dll
(000000006c1b0000 - 000000006c1fd000: C:\WINDOWS\system32\DUSER.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\System32\WSOCK32.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB.dll
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanman.dll
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP.dll
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1.dll
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxprxy.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\winspool.drv
(0000000073380000 - 00000000733d7000: C:\WINDOWS\System32\zipfldr.dll
(0000000073b50000 - 0000000073b67000: C:\WINDOWS\System32\AVIFIL32.dll
(0000000073ba0000 - 0000000073bb3000: C:\WINDOWS\System32\sti.dll
(0000000074320000 - 000000007435d000: C:\WINDOWS\system32\ODBC32.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\System32\MSCTF.dll
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\System32\POWRPROF.dll
(0000000074ae0000 - 0000000074ae7000: C:\WINDOWS\System32\CFGMGR32.dll
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\System32\BatMeter.dll
(0000000074b30000 - 0000000074b76000: C:\WINDOWS\System32\webcheck.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(0000000075970000 - 0000000075a67000: C:\WINDOWS\system32\MSGINA.dll
(0000000075a70000 - 0000000075a91000: C:\WINDOWS\System32\MSVFW32.dll
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\MLANG.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov.dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davclnt.dll
(0000000075f80000 - 000000007607c000: C:\WINDOWS\system32\BROWSEUI.dll
(0000000076280000 - 00000000762a1000: C:\WINDOWS\System32\stobject.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG32.dll
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHELL.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(00000000768d0000 - 0000000076974000: C:\WINDOWS\system32\RASDLG.dll
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKINFO.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshrui.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d40000 - 0000000076d58000: C:\WINDOWS\system32\MPRAPI.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e10000 - 0000000076e35000: C:\WINDOWS\system32\adsldpc.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(0000000077260000 - 00000000772fe000: C:\WINDOWS\system32\urlmon.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778cc000: C:\WINDOWS\system32\SHDOCVW.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077cc0000 - 0000000077cf2000: C:\WINDOWS\system32\ACTIVEDS.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\System32\Secur32.dll
(000000007c340000 - 000000007c396000: C:\WINDOWS\system32\MSVCR71.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d4000: C:\WINDOWS\system32\SHELL32.dll
(000000007f840000 - 000000007f850000: C:\PROGRA~1\ACEMEG~1\SystemS\kmvidc32.dll

*----> State Dump for Thread Id 0x1fc <----*

eax=00000000 ebx=00000003 ecx=0007fe60 edx=7c90eb94 esi=000e9ba8 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
FAULT ->ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SHELL32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\Explorer.EXE
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0007ff08 7ca0be04 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 000e9ba8 7ffdd000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 000205e2 Explorer+0x16e95
0007ffc0 7c816d4f 00000002 5d093c48 7ffdd000 Explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49

*----> Raw Stack Dump <----*
000000000007fef0 18 94 d4 77 6a 3b a2 7c - ac 92 80 7c a8 9b 0e 00 ...wj;.|...|....
000000000007ff00 a8 9b 0e 00 14 ff 07 00 - 14 ff 07 00 04 be a0 7c ...............|
000000000007ff10 00 00 00 00 5c ff 07 00 - 95 6e 01 01 a8 9b 0e 00 ....\....n......
000000000007ff20 00 d0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00 ............$...
000000000007ff30 50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c ed aa 80 7c P.......'..|...|
000000000007ff40 ff ff ff ff 0c 00 00 00 - 00 00 00 00 dd 7b 02 00 .............{..
000000000007ff50 a8 00 00 00 01 00 00 00 - a8 9b 0e 00 c0 ff 07 00 ................
000000000007ff60 b6 e2 01 01 00 00 00 00 - 00 00 00 00 e2 05 02 00 ................
000000000007ff70 01 00 00 00 02 00 00 00 - 48 3c 09 5d 44 00 00 00 ........H<.]D...
000000000007ff80 34 06 02 00 14 06 02 00 - e4 05 02 00 00 00 00 00 4...............
000000000007ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 48 22 19 00 ............H"..
000000000007ffa0 00 00 00 00 1d 69 91 7c - 01 00 00 00 01 00 00 00 .....i.|........
000000000007ffb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000007ffc0 f0 ff 07 00 4f 6d 81 7c - 02 00 00 00 48 3c 09 5d ....Om.|....H<.]
000000000007ffd0 00 d0 fd 7f 38 a9 54 80 - c8 ff 07 00 48 a4 5f 81 ....8.T.....H._.
000000000007ffe0 ff ff ff ff f3 99 83 7c - 58 6d 81 7c 00 00 00 00 .......|Xm.|....
000000000007fff0 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00 ........N.......
0000000000080000 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Actx ........$..
0000000000080010 c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00 ........ .......
0000000000080020 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00 ............4...

*----> State Dump for Thread Id 0x6a8 <----*

eax=00f7f7d4 ebx=77d4b8ba ecx=00000001 edx=0000001e esi=010460d8 edi=00000000
eip=7c90eb94 esp=00f7ff14 ebp=00f7ff44 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SHLWAPI.dll -
ChildEBP RetAddr Args to Child
00f7ff44 01011e8b 00000000 00f7ffb4 77f73782 ntdll!KiFastSystemCallRet
00f7ff50 77f73782 010460d8 0000005c 00860044 Explorer+0x11e8b
00f7ffb4 7c80b50b 00000000 0000005c 00860044 SHLWAPI!Ordinal505+0x3e9
00f7ffec 00000000 77f73713 0007fdbc 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000f7ff14 18 94 d4 77 40 1a 00 01 - 00 00 00 00 d8 60 04 01 ...w@........`..
0000000000f7ff24 00 00 00 00 46 00 03 00 - 0f 00 00 00 00 00 00 00 ....F...........
0000000000f7ff34 00 00 00 00 22 77 4c 00 - f8 00 00 00 3f 01 00 00 ...."wL.....?...
0000000000f7ff44 50 ff f7 00 8b 1e 01 01 - 00 00 00 00 b4 ff f7 00 P...............
0000000000f7ff54 82 37 f7 77 d8 60 04 01 - 5c 00 00 00 44 00 86 00 .7.w.`..\...D...
0000000000f7ff64 bc fd 07 00 62 1e 01 01 - b1 79 01 01 70 01 00 00 ....b....y..p...
0000000000f7ff74 d8 60 04 01 08 00 00 00 - 00 00 00 00 00 00 00 00 .`..............
0000000000f7ff84 00 00 00 00 00 00 00 00 - 00 d8 64 81 a1 a8 4f 80 ..........d...O.
0000000000f7ff94 00 00 00 00 00 00 00 00 - 00 00 00 00 81 a8 4f 80 ..............O.
0000000000f7ffa4 9c 4c 21 f4 00 00 00 00 - 00 00 00 00 dc e2 90 7c .L!............|
0000000000f7ffb4 ec ff f7 00 0b b5 80 7c - 00 00 00 00 5c 00 00 00 .......|....\...
0000000000f7ffc4 44 00 86 00 bc fd 07 00 - 00 b0 fd 7f 00 46 3c 82 D............F<.
0000000000f7ffd4 c0 ff f7 00 f8 ec 5c 81 - ff ff ff ff f3 99 83 7c ......\........|
0000000000f7ffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
0000000000f7fff4 13 37 f7 77 bc fd 07 00 - 00 00 00 00 00 00 00 00 .7.w............
0000000000f80004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f80014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f80024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f80034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f80044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x6d0 <----*

eax=000000c0 ebx=00000000 ecx=77dd6a51 edx=77dd6a18 esi=ffffffff edi=7c90fb78
eip=7c90eb94 esp=00fbff9c ebp=00fbffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00fbffb4 7c80b50b 00000000 7c90fb78 ffffffff ntdll!KiFastSystemCallRet
00fbffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000fbff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff fb 00 \..|.y.|........
0000000000fbffac 00 00 00 00 00 00 00 80 - ec ff fb 00 0b b5 80 7c ...............|
0000000000fbffbc 00 00 00 00 78 fb 90 7c - ff ff ff ff 00 00 00 00 ....x..|........
0000000000fbffcc 00 a0 fd 7f 00 46 3c 82 - c0 ff fb 00 f0 e4 31 82 .....F<.......1.
0000000000fbffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
0000000000fbffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
0000000000fbfffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc00ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc00bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fc00cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x6d8 <----*

eax=000000c0 ebx=00000000 ecx=00f7fbbc edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=0113fcec ebp=0113ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0113ffb4 7c80b50b 00000000 00000020 00f7fce4 ntdll!KiFastSystemCallRet
0113ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000113fcec ab e9 90 7c d5 a0 92 7c - 03 00 00 00 30 fd 13 01 ...|...|....0...
000000000113fcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00 ............ ...
000000000113fd0c e4 fc f7 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c ...........|...|
000000000113fd1c d4 01 00 00 d8 06 00 00 - 03 00 00 00 03 00 00 00 ................
000000000113fd2c 02 00 00 00 d0 01 00 00 - b8 01 00 00 6c 04 00 00 ............l...
000000000113fd3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000113fe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x6f4 <----*

eax=000000c0 ebx=011af744 ecx=00008000 edx=7c90eb94 esi=00000000 edi=7ffdd000
eip=7c90eb94 esp=011af71c ebp=011af7b8 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
011af7b8 77d495f9 00000002 011af7e0 00000000 ntdll!KiFastSystemCallRet
011af814 77d496a8 00000001 011af87c ffffffff USER32!GetLastInputInfo+0x105
011af830 77f77aad 00000001 011af87c 00000000 USER32!MsgWaitForMultipleObjects+0x1f
011af874 77f73cdb 0000080c 004be84e 011afa34 SHLWAPI!Ordinal194+0x2d
011af9f0 7cb24ccc 7cb24af0 7ffa0000 00000028 SHLWAPI!SHCreateThread+0xf5
011afa08 7c8341cc 7ffa0000 011afa64 00000000 SHELL32!CallCPLEntry16+0x107a
011afa50 7c90eac7 7cb24cb5 7ffa0000 00000000 kernel32!QueueUserAPC+0xaa
011afdcc 77d495f9 0000000a 01be86a8 00000000 ntdll!KiUserApcDispatcher+0x7
011afe28 7c9f4e1f 00000009 011afe50 ffffffff USER32!GetLastInputInfo+0x105
011aff4c 7ca0a300 77f73782 00000000 7c809988 SHELL32!Ordinal646+0x21ea
011affb4 7c80b50b 00000000 7c809988 00090000 SHELL32!Ordinal753+0x133
011affec 00000000 77f73713 00f7f4d4 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000011af71c ab e9 90 7c f2 94 80 7c - 02 00 00 00 44 f7 1a 01 ...|...|....D...
00000000011af72c 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000011af73c 02 00 00 00 00 00 00 00 - 0c 08 00 00 f8 01 00 00 ................
00000000011af74c 28 37 0e 00 84 f7 1a 01 - 00 00 09 00 32 07 91 7c (7..........2..|
00000000011af75c 05 00 00 00 78 07 09 00 - 14 00 00 00 01 00 00 00 ....x...........
00000000011af76c 00 00 00 00 00 00 00 00 - 10 00 00 00 00 00 00 00 ................
00000000011af77c 00 00 00 00 01 00 01 00 - 00 d0 fd 7f 00 70 fd 7f .............p..
00000000011af78c 84 07 00 00 00 00 00 00 - 44 f7 1a 01 a8 8a c1 01 ........D.......
00000000011af79c 02 00 00 00 38 f7 1a 01 - 00 00 09 00 40 fa 1a 01 ....8.......@...
00000000011af7ac f3 99 83 7c 90 95 80 7c - 00 00 00 00 14 f8 1a 01 ...|...|........
00000000011af7bc f9 95 d4 77 02 00 00 00 - e0 f7 1a 01 00 00 00 00 ...w............
00000000011af7cc ff ff ff ff 00 00 00 00 - 00 00 00 00 ff ff ff ff ................
00000000011af7dc ac 92 80 7c 0c 08 00 00 - f8 01 00 00 70 fc 1a 01 ...|........p...
00000000011af7ec 40 11 0e 00 00 00 00 00 - 70 fc 1a 01 00 00 00 00 @.......p.......
00000000011af7fc 64 d6 90 7c da a6 80 7c - 00 00 00 00 00 00 00 00 d..|...|........
00000000011af80c 00 70 fd 7f f8 01 00 00 - 30 f8 1a 01 a8 96 d4 77 .p......0......w
00000000011af81c 01 00 00 00 7c f8 1a 01 - ff ff ff ff 40 00 00 00 ....|.......@...
00000000011af82c e0 f7 1a 01 74 f8 1a 01 - ad 7a f7 77 01 00 00 00 ....t....z.w....
00000000011af83c 7c f8 1a 01 00 00 00 00 - ff ff ff ff 40 00 00 00 |...........@...
00000000011af84c 77 9b 80 7c 00 00 00 00 - 28 00 00 00 b4 f8 1a 01 w..|....(.......

*----> State Dump for Thread Id 0x820 <----*

eax=0192eef4 ebx=00004e20 ecx=00146438 edx=00131c8c esi=0192fd68 edi=77d491c6
eip=7c90eb94 esp=0192fcf8 ebp=0192fd14 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\System32\stobject.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0192fd14 76281513 0192fd68 00000000 00000000 ntdll!KiFastSystemCallRet
0192fd8c 76283746 76280000 00000000 00010100 stobject+0x1513
0192ffb4 7c80b50b 00000000 00000000 00000000 stobject!DllCanUnloadNow+0x1fa4
0192ffec 00000000 762836f7 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000192fcf8 be 91 d4 77 f1 91 d4 77 - 68 fd 92 01 00 00 00 00 ...w...wh.......
000000000192fd08 00 00 00 00 00 00 00 00 - 00 00 00 00 8c fd 92 01 ................
000000000192fd18 13 15 28 76 68 fd 92 01 - 00 00 00 00 00 00 00 00 ..(vh...........
000000000192fd28 00 00 00 00 00 00 00 00 - 00 00 28 76 00 00 00 00 ..........(v....
000000000192fd38 30 00 00 00 00 40 00 00 - 21 13 28 76 00 00 00 00 0....@..!.(v....
000000000192fd48 1e 00 00 00 00 00 28 76 - 81 00 06 00 11 00 01 00 ......(v........
000000000192fd58 10 00 00 00 00 00 00 00 - f4 31 28 76 00 00 00 00 .........1(v....
000000000192fd68 0c 01 03 00 05 04 00 00 - 00 00 00 00 be 00 00 00 ................
000000000192fd78 ff 74 4c 00 f8 00 00 00 - 3f 01 00 00 00 00 00 00 .tL.....?.......
000000000192fd88 00 00 00 00 b4 ff 92 01 - 46 37 28 76 00 00 28 76 ........F7(v..(v
000000000192fd98 00 00 00 00 00 01 01 00 - 01 00 00 00 00 00 00 00 ................
000000000192fda8 43 00 3a 00 5c 00 57 00 - 49 00 4e 00 44 00 4f 00 C.:.\.W.I.N.D.O.
000000000192fdb8 57 00 53 00 5c 00 53 00 - 79 00 73 00 74 00 65 00 W.S.\.S.y.s.t.e.
000000000192fdc8 6d 00 33 00 32 00 5c 00 - 73 00 74 00 6f 00 62 00 m.3.2.\.s.t.o.b.
000000000192fdd8 6a 00 65 00 63 00 74 00 - 2e 00 64 00 6c 00 6c 00 j.e.c.t...d.l.l.
000000000192fde8 00 00 81 7c 1b 00 00 00 - 00 02 00 00 fc ff 92 01 ...|............
000000000192fdf8 23 00 00 00 56 08 81 7c - 1b 00 00 00 00 02 00 00 #...V..|........
000000000192fe08 fc ff 78 01 23 00 00 00 - 18 80 f7 e1 a9 6b fe f3 ..x.#........k..
000000000192fe18 e8 3c f4 e1 69 8d 4f 80 - 2c 00 00 00 00 00 00 00 .<..i.O.,.......
000000000192fe28 a8 f5 12 00 9c a8 07 00 - ec 6a fe f3 1c 6b fe f3 .........j...k..

*----> State Dump for Thread Id 0x8c8 <----*

eax=72d230e8 ebx=017cfef8 ecx=0000005d edx=00000000 esi=00000000 edi=7ffdd000
eip=7c90eb94 esp=017cfed0 ebp=017cff6c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv -
ChildEBP RetAddr Args to Child
017cff6c 7c809c86 00000002 017cffa4 00000000 ntdll!KiFastSystemCallRet
017cff88 72d2312a 00000002 017cffa4 00000000 kernel32!WaitForMultipleObjects+0x18
017cffb4 7c80b50b 00000000 00090280 00090000 wdmaud!midMessage+0x348
017cffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000017cfed0 ab e9 90 7c f2 94 80 7c - 02 00 00 00 f8 fe 7c 01 ...|...|......|.
00000000017cfee0 01 00 00 00 00 00 00 00 - 00 00 00 00 80 02 09 00 ................
00000000017cfef0 00 00 00 00 00 00 00 00 - 2c 04 00 00 3c 04 00 00 ........,...<...
00000000017cff00 1a 0d ef e1 7c 00 f8 00 - 2a 0d ef e1 74 e4 00 e1 ....|...*...t...
00000000017cff10 de 2d 4e 80 44 df 33 82 - 14 00 00 00 01 00 00 00 .-N.D.3.........
00000000017cff20 f0 29 15 00 00 00 00 00 - 00 00 00 00 dc dd 33 82 .)............3.
00000000017cff30 00 5a 3c 82 ea b5 57 80 - 00 d0 fd 7f 00 d0 fa 7f .Z<...W.........
00000000017cff40 00 d0 fa 7f 00 00 00 00 - f8 fe 7c 01 00 00 00 00 ..........|.....
00000000017cff50 02 00 00 00 ec fe 7c 01 - 00 00 00 00 dc ff 7c 01 ......|.......|.
00000000017cff60 f3 99 83 7c 90 95 80 7c - 00 00 00 00 88 ff 7c 01 ...|...|......|.
00000000017cff70 86 9c 80 7c 02 00 00 00 - a4 ff 7c 01 00 00 00 00 ...|......|.....
00000000017cff80 ff ff ff ff 00 00 00 00 - b4 ff 7c 01 2a 31 d2 72 ..........|.*1.r
00000000017cff90 02 00 00 00 a4 ff 7c 01 - 00 00 00 00 ff ff ff ff ......|.........
00000000017cffa0 00 00 09 00 2c 04 00 00 - 3c 04 00 00 00 00 00 00 ....,...<.......
00000000017cffb0 dc e2 90 7c ec ff 7c 01 - 0b b5 80 7c 00 00 00 00 ...|..|....|....
00000000017cffc0 80 02 09 00 00 00 09 00 - 00 00 00 00 00 d0 fa 7f ................
00000000017cffd0 00 46 3c 82 c0 ff 7c 01 - 90 d3 5b 81 ff ff ff ff .F<...|...[.....
00000000017cffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
00000000017cfff0 00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00 .....0.r........
00000000017d0000 00 00 00 00 9f 40 13 00 - 10 00 90 01 17 00 b0 01 .....@..........

*----> State Dump for Thread Id 0xb14 <----*

eax=00000010 ebx=0246fde8 ecx=01bdf668 edx=000006ed esi=00000000 edi=7ffdd000
eip=7c90eb94 esp=0246fdc0 ebp=0246fe5c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\DUSER.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\msvcrt.dll -
ChildEBP RetAddr Args to Child
0246fe5c 77d495f9 00000002 0246fe84 00000000 ntdll!KiFastSystemCallRet
0246feb8 6c1e4b92 00000001 0246feec ffffffff USER32!GetLastInputInfo+0x105
0246fed8 6c1e4ddc 000004ff ffffffff 00000001 DUSER+0x34b92
0246ff0c 6c1de394 0246ff4c 00000000 00000000 DUSER+0x34ddc
0246ff2c 6c1da6f1 0246ff4c 00000000 00000000 DUSER!GetMessageExA+0x44
0246ff80 77c3a3b0 00000000 7c910000 7c9131dc DUSER!DUserStopAnimation+0xa505
0246ffb4 7c80b50b 0003b310 7c910000 7c9131dc msvcrt!endthreadex+0xa9
0246ffec 00000000 77c3a341 0003b310 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000246fdc0 ab e9 90 7c f2 94 80 7c - 02 00 00 00 e8 fd 46 02 ...|...|......F.
000000000246fdd0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000246fde0 02 00 00 00 04 00 00 00 - 94 06 00 00 08 06 00 00 ................
000000000246fdf0 52 00 01 01 e0 00 00 00 - 80 02 00 00 00 20 4c 02 R............ L.
000000000246fe00 40 fe 46 02 b1 a2 1c 6c - 14 00 00 00 01 00 00 00 @.F....l........
000000000246fe10 00 00 00 00 00 00 00 00 - 10 00 00 00 00 20 4c 02 ............. L.
000000000246fe20 01 00 04 00 00 00 00 00 - 00 d0 fd 7f 00 60 fd 7f .............`..
000000000246fe30 a4 ff 46 02 00 00 00 00 - e8 fd 46 02 ff ff ff ff ..F.......F.....
000000000246fe40 02 00 00 00 dc fd 46 02 - 00 20 4c 02 a4 ff 46 02 ......F.. L...F.
000000000246fe50 f3 99 83 7c 90 95 80 7c - 00 00 00 00 b8 fe 46 02 ...|...|......F.
000000000246fe60 f9 95 d4 77 02 00 00 00 - 84 fe 46 02 00 00 00 00 ...w......F.....
000000000246fe70 ff ff ff ff 00 00 00 00 - d8 8d be 01 01 00 00 00 ................
000000000246fe80 4c ff 46 02 94 06 00 00 - 08 06 00 00 8e 72 1e 6c L.F..........r.l
000000000246fe90 ff ff ff ff a9 72 1e 6c - 0f f0 06 00 60 f6 bd 01 .....r.l....`...
000000000246fea0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000246feb0 00 60 fd 7f 08 06 00 00 - d8 fe 46 02 92 4b 1e 6c .`........F..K.l
000000000246fec0 01 00 00 00 ec fe 46 02 - ff ff ff ff ff 04 00 00 ......F.........
000000000246fed0 84 fe 46 02 ff ff ff ff - 0c ff 46 02 dc 4d 1e 6c ..F.......F..M.l
000000000246fee0 ff 04 00 00 ff ff ff ff - 01 00 00 00 94 06 00 00 ................
000000000246fef0 00 00 00 00 00 00 00 00 - 10 b3 03 00 01 00 00 00 ................

*----> State Dump for Thread Id 0xf2c <----*

eax=77e78c94 ebx=00000000 ecx=01be005c edx=000bc83c esi=000bc800 edi=000bc8a4
eip=7c90eb94 esp=0277fe1c ebp=0277ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0277ff80 77e76c22 0277ffa8 77e76a3b 000bc800 ntdll!KiFastSystemCallRet
0277ff88 77e76a3b 000bc800 0145fc98 7c90ee18 RPCRT4!I_RpcBCacheFree+0x5ea
0277ffa8 77e76c0a 000bc6b8 0277ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0277ffb4 7c80b50b 01bf4338 0145fc98 7c90ee18 RPCRT4!I_RpcBCacheFree+0x5d2
0277ffec 00000000 77e76bf0 01bf4338 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000277fe1c 99 e3 90 7c 03 67 e7 77 - 8c 01 00 00 70 ff 77 02 ...|.g.w....p.w.
000000000277fe2c 00 00 00 00 80 9d bf 01 - 4c ff 77 02 80 80 80 80 ........L.w.....
000000000277fe3c 80 80 80 80 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277fe4c 80 80 80 7f 02 80 80 80 - 00 00 7f 7f 7f 7f 7f 7f ................
000000000277fe5c 7f 7f 7f 7f 7f 7f 7f 7f - 7f 7f 7f 7f 80 80 80 80 ................
000000000277fe6c 02 00 00 00 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277fe7c 80 80 80 80 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277fe8c 80 80 80 80 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277fe9c 80 80 80 80 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277feac 80 80 80 80 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277febc 80 80 80 80 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277fecc 80 80 80 80 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277fedc 80 80 80 80 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277feec 80 80 80 80 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277fefc 80 80 80 80 80 80 80 80 - 80 80 80 80 80 80 80 80 ................
000000000277ff0c 80 80 80 80 80 80 80 80 - bc a1 54 81 24 ec 83 f4 ..........T.$...
000000000277ff1c b2 c2 4d 80 ba c2 4d 80 - 8c a1 54 81 20 a0 54 81 ..M...M...T. .T.
000000000277ff2c 54 a0 54 81 80 ff 77 02 - 99 66 e7 77 4c ff 77 02 T.T...w..f.wL.w.
000000000277ff3c a9 66 e7 77 ed 10 90 7c - d0 26 bf 01 38 43 bf 01 .f.w...|.&..8C..
000000000277ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0x3a4 <----*

eax=00000000 ebx=00000000 ecx=001348f0 edx=00134970 esi=000bc800 edi=000bc8a4
eip=7c90eb94 esp=00fffe1c ebp=00ffff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00ffff80 77e76c22 00ffffa8 77e76a3b 000bc800 ntdll!KiFastSystemCallRet
00ffff88 77e76a3b 000bc800 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
00ffffa8 77e76c0a 000bc6b8 00ffffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
00ffffb4 7c80b50b 00148410 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
00ffffec 00000000 77e76bf0 00148410 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000fffe1c 99 e3 90 7c 03 67 e7 77 - 8c 01 00 00 70 ff ff 00 ...|.g.w....p...
0000000000fffe2c 00 00 00 00 88 4b c2 01 - 4c ff ff 00 00 00 00 00 .....K..L.......
0000000000fffe3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffe4c 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffe5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffe6c 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffe7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffe8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffe9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffeac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffebc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffecc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffedc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffeec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000fffefc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ffff0c 00 00 00 00 00 00 00 00 - 94 bb 57 81 24 dc d3 f3 ..........W.$...
0000000000ffff1c b2 c2 4d 80 ba c2 4d 80 - 64 bb 57 81 f8 b9 57 81 ..M...M.d.W...W.
0000000000ffff2c 2c ba 57 81 80 ff ff 00 - 99 66 e7 77 4c ff ff 00 ,.W......f.wL...
0000000000ffff3c a9 66 e7 77 ed 10 90 7c - 88 79 0d 00 10 84 14 00 .f.w...|.y......
0000000000ffff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0x5b0 <----*

eax=00170c48 ebx=00007530 ecx=0016c098 edx=0145fdbc esi=00000000 edi=0145ff50
eip=7c90eb94 esp=0145ff20 ebp=0145ff78 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr Args to Child
0145ff78 7c802451 0000ea60 00000000 0145ffb4 ntdll!KiFastSystemCallRet
0145ff88 774fd6ae 0000ea60 000f3180 774fd83b kernel32!Sleep+0xf
0145ffb4 7c80b50b 000f3180 0192e2e0 77ddd202 ole32!IsValidInterface+0x295
0145ffec 00000000 774fd888 000f3180 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000145ff20 5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff 45 01 \..|.#.|....P.E.
000000000145ff30 50 25 80 7c f8 6d 60 77 - 30 75 00 00 14 00 00 00 P%.|.m`w0u......
000000000145ff40 01 00 00 00 60 12 15 00 - 00 00 00 00 00 00 00 00 ....`...........
000000000145ff50 00 ba 3c dc ff ff ff ff - b4 fe 45 01 50 ff 45 01 ..<.......E.P.E.
000000000145ff60 30 ff 45 01 b4 fe 45 01 - dc ff 45 01 f3 99 83 7c 0.E...E...E....|
000000000145ff70 58 24 80 7c 00 00 00 00 - 88 ff 45 01 51 24 80 7c X$.|......E.Q$.|
000000000145ff80 60 ea 00 00 00 00 00 00 - b4 ff 45 01 ae d6 4f 77 `.........E...Ow
000000000145ff90 60 ea 00 00 80 31 0f 00 - 3b d8 4f 77 00 00 00 00 `....1..;.Ow....
000000000145ffa0 e0 e2 92 01 80 31 0f 00 - 00 00 4e 77 a3 d8 4f 77 .....1....Nw..Ow
000000000145ffb0 02 d2 dd 77 ec ff 45 01 - 0b b5 80 7c 80 31 0f 00 ...w..E....|.1..
000000000145ffc0 e0 e2 92 01 02 d2 dd 77 - 80 31 0f 00 00 40 fd 7f .......w.1...@..
000000000145ffd0 00 46 3c 82 c0 ff 45 01 - 90 22 00 82 ff ff ff ff .F<...E.."......
000000000145ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
000000000145fff0 00 00 00 00 88 d8 4f 77 - 80 31 0f 00 00 00 00 00 ......Ow.1......
0000000001460000 a0 e1 db 57 25 de d2 11 - af dd 00 10 5a 27 99 b5 ...W%.......Z'..
0000000001460010 0a c0 02 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001460020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001460030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001460040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001460050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x970 <----*

eax=00000000 ebx=00000000 ecx=01c24b80 edx=000c4640 esi=000bc800 edi=000bc8a4
eip=7c90eb94 esp=0283fe1c ebp=0283ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0283ff80 77e76c22 0283ffa8 77e76a3b 000bc800 ntdll!KiFastSystemCallRet
0283ff88 77e76a3b 000bc800 00000000 01ce0178 RPCRT4!I_RpcBCacheFree+0x5ea
0283ffa8 77e76c0a 000bc6b8 0283ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0283ffb4 7c80b50b 000fad98 00000000 01ce0178 RPCRT4!I_RpcBCacheFree+0x5d2
0283ffec 00000000 77e76bf0 000fad98 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000283fe1c 99 e3 90 7c 03 67 e7 77 - 8c 01 00 00 70 ff 83 02 ...|.g.w....p...
000000000283fe2c 00 00 00 00 b8 9e bf 01 - 4c ff 83 02 32 07 91 01 ........L...2...
000000000283fe3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000283fe4c 00 00 00 00 02 ff ff ff - 00 00 00 00 ff 03 1f 00 ................
000000000283fe5c 00 00 00 00 40 bb 00 00 - 5c 5b c6 f3 70 3b 56 80 ....@...\[..p;V.
000000000283fe6c 03 00 00 00 00 00 00 00 - f0 0b af e1 00 00 00 00 ................
000000000283fe7c 00 00 00 02 00 00 00 00 - 00 00 00 00 54 5c c6 f3 ............T\..
000000000283fe8c 54 5c c6 f3 00 00 00 00 - e7 3b 56 80 00 00 00 02 T\.......;V.....
000000000283fe9c 54 5c c6 f3 5c 5b c6 f3 - 14 b7 57 80 54 5c c6 f3 T\..\[....W.T\..
000000000283feac 34 ac 58 81 f0 a9 58 81 - 34 ac 58 81 f0 a9 58 81 4.X...X.4.X...X.
000000000283febc 34 ac 58 81 f0 a9 58 81 - 00 fd 1d 82 f0 a9 58 81 4.X...X.......X.
000000000283fecc 34 ac 58 81 f0 a9 58 81 - a0 fd 1d 82 f0 a9 58 81 4.X...X.......X.
000000000283fedc d8 a9 58 81 c4 5c c6 f3 - 57 b0 57 80 18 5d c6 f3 ..X..\..W.W..]..
000000000283feec 4c f5 1c 01 38 f5 1c 01 - 5d 4b 08 00 00 00 00 00 L...8...]K......
000000000283fefc 00 00 00 00 01 00 00 00 - ff 03 1f 00 ff 03 1f 00 ................
000000000283ff0c ff 03 1f 00 00 00 00 00 - 44 df 32 82 24 5c c6 f3 ........D.2.$\..
000000000283ff1c b2 c2 4d 80 ba c2 4d 80 - 14 df 32 82 a8 dd 32 82 ..M...M...2...2.
000000000283ff2c dc dd 32 82 80 ff 83 02 - 99 66 e7 77 4c ff 83 02 ..2......f.wL...
000000000283ff3c a9 66 e7 77 ed 10 90 7c - a8 ff 18 00 98 ad 0f 00 .f.w...|........
000000000283ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0xb04 <----*

eax=02870000 ebx=031dce30 ecx=00001000 edx=7c90eb94 esi=00000564 edi=00000000
eip=7c90eb94 esp=031dce14 ebp=031dd11c iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
031dd11c 7c965714 031dd2bc 031dd590 02cb415b ntdll!KiFastSystemCallRet
031dd25c 7c9661a1 031dd2bc 02ca0000 c0000005 ntdll!RtlTraceDatabaseAdd+0x1b9
031dd594 7c94ea5f 02cb415b fffffffe fffffffe ntdll!RtlUnhandledExceptionFilter+0xb2
031dd5e8 7c93783a 02cb415b 02ca0000 031dd67c ntdll!RtlInitializeSListHead+0x15a4f
031dd664 7c90eafa 00000000 031dd698 031dd67c ntdll!LdrAddRefDll+0x221
031dd96c 00000000 0418781e 00000001 031dd9a8 ntdll!KiUserExceptionDispatcher+0xe

*----> Raw Stack Dump <----*
00000000031dce14 ab e9 90 7c d5 33 86 7c - 02 00 00 00 4c cf 1d 03 ...|.3.|....L...
00000000031dce24 01 00 00 00 01 00 00 00 - 00 00 00 00 43 00 3a 00 ............C.:.
00000000031dce34 5c 00 57 00 49 00 4e 00 - 44 00 4f 00 57 00 53 00 \.W.I.N.D.O.W.S.
00000000031dce44 5c 00 73 00 79 00 73 00 - 74 00 65 00 6d 00 33 00 \.s.y.s.t.e.m.3.
00000000031dce54 32 00 5c 00 64 00 72 00 - 77 00 74 00 73 00 6e 00 2.\.d.r.w.t.s.n.
00000000031dce64 33 00 32 00 20 00 2d 00 - 70 00 20 00 31 00 34 00 3.2. .-.p. .1.4.
00000000031dce74 32 00 34 00 20 00 2d 00 - 65 00 20 00 31 00 33 00 2.4. .-.e. .1.3.
00000000031dce84 38 00 30 00 20 00 2d 00 - 67 00 00 00 00 00 00 00 8.0. .-.g.......
00000000031dce94 2e 00 00 00 00 00 00 00 - 00 00 00 00 1c d1 1d 03 ................
00000000031dcea4 0f 32 86 7c 05 00 00 00 - 1c d1 1d 03 41 32 86 7c .2.|........A2.|
00000000031dceb4 69 32 86 7c 00 00 00 00 - 00 00 00 00 bc d2 1d 03 i2.|............
00000000031dcec4 44 00 00 00 00 00 00 00 - 78 34 86 7c 00 00 00 00 D.......x4.|....
00000000031dced4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000031dcee4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000031dcef4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000031dcf04 00 00 00 00 00 80 fa 7f - d8 c0 97 7c 00 00 00 00 ...........|....
00000000031dcf14 00 00 00 00 00 80 fa 7f - 00 00 00 00 00 00 00 00 ................
00000000031dcf24 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000031dcf34 00 00 00 00 00 0
  • 0






Similar Topics

0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users

As Featured On:

Microsoft Yahoo BBC MSN PC Magazine Washington Post HP