ok .. who can put this into english for me?
#1
Thread Starter
Super Moderator
iTrader: (2)
Joined: Jun 2003
Posts: 18,598
Likes: 4
From: somwhere in wow
ok .. who can put this into english for me?
having problems with ie7 at the moment
Application exception occurred:
App: C:\Program Files\Internet Explorer\iexplore.exe (pid=1968)
When: 5/19/2007 @ 21:10:03.593
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: UPSTAIRS
User Name: Peter
Terminal Session Id: 0
Number of Processors: 2
Processor Type: x86 Family 15 Model 4 Stepping 1
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Multiprocessor Free
Registered Organization: home use
Registered Owner: peter
*----> Task List <----*
0 System Process
4 System
1044 smss.exe
1092 csrss.exe
1116 winlogon.exe
1160 services.exe
1172 lsass.exe
1344 svchost.exe
1392 svchost.exe
1536 svchost.exe
1576 fws.exe
1624 svchost.exe
1804 svchost.exe
388 spoolsv.exe
540 aswUpdSv.exe
556 ashServ.exe
608 avgamsvr.exe
616 avgupsvc.exe
648 avgemc.exe
668 dvpapi.exe
1452 Explorer.EXE
1744 SMAgent.exe
1900 svchost.exe
1240 ashMaiSv.exe
1560 ashWebSv.exe
2172 alg.exe
2896 avgcc.exe
2912 RPS.exe
2932 ashDisp.exe
2968 SMax4PNP.exe
3068 Smax4.exe
3080 AsusProb.exe
3092 jusched.exe
3100 pg2.exe
3124 ctfmon.exe
3400 svchost.exe
1968 iexplore.exe
2748 WLLoginProxy.exe
1000 dwwin.exe
3724 drwtsn32.exe
*----> Module List <----*
(0000000000400000 - 000000000049a000: C:\Program Files\Internet Explorer\iexplore.exe
(00000000009b0000 - 0000000000f79000: C:\WINDOWS\system32\IEFRAME.dll
(00000000018d0000 - 00000000018d9000: C:\WINDOWS\system32\Normaliz.dll
(0000000002150000 - 0000000002416000: C:\WINDOWS\system32\msi.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 0000000010008000: C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
(000000001b000000 - 000000001b00c000: C:\WINDOWS\system32\ImgUtil.dll
(000000001b060000 - 000000001b06e000: C:\WINDOWS\system32\pngfilt.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(0000000027500000 - 00000000275c8000: C:\Program Files\Common Files\Microsoft Shared\Windows Live\msidcrl40.dll
(0000000029500000 - 0000000029551000: C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
(0000000030000000 - 00000000302ef000: C:\WINDOWS\system32\Macromed\Flash\Flash9c.ocx
(0000000047060000 - 0000000047081000: C:\WINDOWS\system32\xmllite.dll
(000000004d4f0000 - 000000004d548000: C:\WINDOWS\system32\WINHTTP.dll
(000000004ec50000 - 000000004edf3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_65 95b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(0000000058760000 - 0000000058792000: C:\WINDOWS\system32\iepeers.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\netapi32.dll
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\comctl32.dll
(000000005dca0000 - 000000005dce5000: C:\WINDOWS\system32\iertutil.dll
(000000005dff0000 - 000000005e01f000: C:\WINDOWS\system32\IEUI.dll
(0000000060080000 - 00000000600cd000: C:\Program Files\ntl\ntl Netguard\ClBR.dll
(0000000060100000 - 0000000060115000: C:\Program Files\ntl\ntl Netguard\CstmUIR.dll
(0000000060170000 - 0000000060193000: C:\Program Files\ntl\ntl Netguard\FBHR.dll
(0000000060210000 - 000000006023b000: C:\Program Files\ntl\ntl Netguard\inhR.dll
(0000000060270000 - 0000000060286000: C:\Program Files\ntl\ntl Netguard\LbZkTstR.dll
(00000000602c0000 - 00000000602cc000: C:\Program Files\ntl\ntl Netguard\LibZkR.dll
(00000000602e0000 - 00000000602e9000: C:\Program Files\ntl\ntl Netguard\OemLibR.dll
(0000000060330000 - 000000006034d000: C:\Program Files\ntl\ntl Netguard\PersistR.dll
(0000000060350000 - 000000006035e000: C:\Program Files\ntl\ntl Netguard\pkR.dll
(00000000606b0000 - 00000000606cf000: C:\Program Files\ntl\ntl Netguard\Resources\zk_en_US\ClB_Rsrc.dll
(0000000060730000 - 0000000060733000: C:\Program Files\ntl\ntl Netguard\Resources\zk_en_US\FBH_Rsrc.dll
(0000000060770000 - 000000006078f000: C:\Program Files\ntl\ntl Netguard\Resources\zk_en_US\inh_Rsrc.dll
(0000000061410000 - 0000000061534000: C:\WINDOWS\system32\urlmon.dll
(0000000061930000 - 000000006197a000: C:\Program Files\Internet Explorer\ieproxy.dll
(0000000063380000 - 00000000633f8000: C:\WINDOWS\System32\jscript.dll
(0000000063400000 - 0000000063433000: C:\WINDOWS\system32\MSRATING.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000069b10000 - 0000000069c42000: c:\WINDOWS\system32\msxml4.dll
(000000006d430000 - 000000006d43a000: C:\WINDOWS\System32\ddrawex.dll
(000000006d7c0000 - 000000006d839000: C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\system32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\ws2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\system32\actxprxy.dll
(00000000722b0000 - 00000000722b5000: C:\WINDOWS\system32\SensApi.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(0000000072ea0000 - 0000000072f00000: C:\WINDOWS\system32\ieapfltr.dll
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000073760000 - 00000000737a9000: C:\WINDOWS\System32\DDRAW.dll
(0000000073b30000 - 0000000073b45000: C:\WINDOWS\system32\mscms.dll
(0000000073bc0000 - 0000000073bc6000: C:\WINDOWS\System32\DCIMAN32.dll
(00000000746c0000 - 00000000746e9000: C:\WINDOWS\system32\msls31.dll
(00000000746f0000 - 000000007471a000: C:\WINDOWS\System32\msimtf.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000074980000 - 0000000074a8e000: C:\WINDOWS\System32\msxml3.dll
(0000000074d90000 - 0000000074dfb000: C:\WINDOWS\system32\USP10.dll
(00000000755c0000 - 00000000755ee000: C:\WINDOWS\system32\msctfime.ime
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\MLANG.dll
(0000000075e60000 - 0000000075e73000: C:\WINDOWS\system32\cryptnet.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000076200000 - 0000000076277000: C:\WINDOWS\system32\mshtmled.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\MSIMG32.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(00000000767f0000 - 0000000076817000: C:\WINDOWS\system32\schannel.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\userenv.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076bf0000 - 0000000076bfb000: C:\WINDOWS\system32\PSAPI.DLL
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.dll
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: C:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 000000007727e000: C:\WINDOWS\system32\WININET.dll
(00000000773d0000 - 00000000774d3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077690000 - 00000000776b1000: C:\WINDOWS\system32\NTMARTA.DLL
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\apphelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(000000007c120000 - 000000007c139000: C:\Program Files\ntl\ntl Netguard\ATL71.DLL
(000000007c140000 - 000000007c243000: C:\Program Files\ntl\ntl Netguard\MFC71.DLL
(000000007c340000 - 000000007c396000: C:\Program Files\ntl\ntl Netguard\MSVCR71.dll
(000000007c3a0000 - 000000007c41b000: C:\Program Files\ntl\ntl Netguard\MSVCP71.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll
(000000007e410000 - 000000007e4a0000: C:\WINDOWS\system32\USER32.dll
(000000007e830000 - 000000007eb9f000: C:\WINDOWS\system32\mshtml.dll
*----> State Dump for Thread Id 0x5d4 <----*
eax=00000001 ebx=00000000 ecx=00000030 edx=00000030 esi=000002b7 edi=000001be
eip=7c90eb94 esp=0012e2f8 ebp=0012e380 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\IEFRAME.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
*** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\Internet Explorer\iexplore.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0012e380 00b7f626 00000000 000c026c 00000000 ntdll!KiFastSystemCallRet
0012e404 00b5605c 000c026c 00000000 00000000 IEFRAME+0x1cf626
0012e424 00b560e8 0012e7bc 000c026c 00000110 IEFRAME!Ordinal102+0x1e77c
0012e448 7e418734 000c026c 00000110 0005025a IEFRAME!Ordinal102+0x1e808
0012e474 7e423b9c 00b560a2 000c026c 00000110 USER32!GetDC+0x6d
0012e4e0 7e423591 00147e10 00b560a2 000c026c USER32!DefDlgProcW+0x402
0012e528 7e4237bc 00000000 00000110 0005025a USER32!PrivateExtractIconExW+0xfe
0012e544 7e418734 000c026c 00000110 0005025a USER32!DefDlgProcW+0x22
0012e570 7e418816 7e42379a 000c026c 00000110 USER32!GetDC+0x6d
0012e5d8 7e41b89b 00147e10 7e42379a 000c026c USER32!GetDC+0x14f
0012e614 7e4243e0 0067bdc0 005fea80 0005025a USER32!GetParent+0x16c
0012e6cc 7e42592c 00000000 0067bdc0 00000000 USER32!GetWindowTextLengthW+0x547
0012e700 7e425981 01200001 012a5230 0037018e USER32!DrawStateW+0x1df
0012e720 7e42559e 01200001 012a5230 0037018e USER32!DialogBoxIndirectParamAorW+0x36
0012e744 009c5442 01200001 00007900 0037018e USER32!DialogBoxParamW+0x3f
0012e764 009c5600 01200001 00007900 0037018e IEFRAME!Ordinal165+0x3750
0012e788 00b56121 01200001 00007900 0037018e IEFRAME!Ordinal165+0x390e
0012e7a8 00a97fd4 0037018e 00000000 0014fef0 IEFRAME!Ordinal102+0x1e841
0012e7d4 00a75d8c 00a5c62c 0012e814 00a75d6f IEFRAME!Ordinal160+0x19ae2
0012e7e0 00a75d6f 00000001 0014cf78 0014f860 IEFRAME!Ordinal101+0x4e28
0012e814 00a6fd55 0014fef0 0012e844 00a712af IEFRAME!Ordinal101+0x4e0b
0012e820 00a712af 00000000 00000000 0014cf78 IEFRAME!SetQueryNetSessionCount+0xa731
0012e844 00a711fd 15d4000a 0014cf78 00000000 IEFRAME!Ordinal101+0x34b
0012f8b4 00a710ad 0014cf78 77f648d4 00000000 IEFRAME!Ordinal101+0x299
0012faec 00402ead 00146ae8 00000001 0040f070 IEFRAME!Ordinal101+0x149
0012ff2c 00402d3a 00400000 00000000 0002070c iexplore+0x2ead
0012ffc0 7c816fd7 00fdcecc 7c90e1fe 7ffd6000 iexplore+0x2d3a
0012fff0 00000000 00402bc5 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49
*----> Raw Stack Dump <----*
000000000012e2f8 27 c0 41 7e 12 e3 b7 00 - 6c 02 0c 00 00 00 00 00 '.A~....l.......
000000000012e308 b7 02 00 00 be 01 00 00 - 58 01 00 00 a5 00 00 00 ........X.......
000000000012e318 05 00 00 00 8e 01 37 00 - 00 00 00 00 d4 b6 41 7e ......7.......A~
000000000012e328 28 00 00 00 00 00 00 00 - 00 00 00 00 40 06 00 00 (...........@...
000000000012e338 b0 04 00 00 00 00 00 00 - 00 00 00 00 40 06 00 00 ............@...
000000000012e348 70 04 00 00 01 00 00 00 - fc 84 41 7e a4 85 41 7e p.........A~..A~
000000000012e358 6c 02 0c 00 01 00 00 00 - a5 00 00 00 20 00 00 00 l........... ...
000000000012e368 22 06 00 00 02 04 00 00 - b7 02 00 00 be 01 00 00 "...............
000000000012e378 0f 04 00 00 63 02 00 00 - 04 e4 12 00 26 f6 b7 00 ....c.......&...
000000000012e388 00 00 00 00 6c 02 0c 00 - 00 00 00 00 b7 02 00 00 ....l...........
000000000012e398 be 01 00 00 00 00 00 00 - 00 00 00 00 05 00 00 00 ................
000000000012e3a8 01 00 00 00 6c 02 0c 00 - bc e7 12 00 45 5d 42 7e ....l.......E]B~
000000000012e3b8 01 00 00 00 f4 e3 12 00 - 00 00 00 00 ba b8 41 7e ..............A~
000000000012e3c8 0c e4 12 00 33 4d b5 00 - 82 01 11 00 93 bb 12 00 ....3M..........
000000000012e3d8 0c e4 12 00 3b 4d b5 00 - a9 00 00 00 3e 00 00 00 ....;M......>...
000000000012e3e8 01 02 00 00 e3 00 00 00 - a5 00 00 00 20 00 00 00 ............ ...
000000000012e3f8 22 06 00 00 02 04 00 00 - 8e 01 37 00 24 e4 12 00 ".........7.$...
000000000012e408 5c 60 b5 00 6c 02 0c 00 - 00 00 00 00 00 00 00 00 \`..l...........
000000000012e418 bc e7 12 00 5a 02 05 00 - 00 00 00 00 48 e4 12 00 ....Z.......H...
000000000012e428 e8 60 b5 00 bc e7 12 00 - 6c 02 0c 00 10 01 00 00 .`......l.......
*----> State Dump for Thread Id 0x4f4 <----*
eax=77df9981 ebx=011ffed0 ecx=00000006 edx=00000000 esi=00000000 edi=7ffd6000
eip=7c90eb94 esp=011ffea8 ebp=011fff44 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ADVAPI32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
011fff44 77df9b26 00000002 011fff6c 00000000 ntdll!KiFastSystemCallRet
011fffb4 7c80b683 00000000 7c9140bb 00000000 ADVAPI32!RegDeleteKeyW+0x2a2
011fffec 00000000 77df9981 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
00000000011ffea8 ab e9 90 7c e2 94 80 7c - 02 00 00 00 d0 fe 1f 01 ...|...|........
00000000011ffeb8 01 00 00 00 01 00 00 00 - 04 ff 1f 01 e0 2e f8 00 ................
00000000011ffec8 40 65 e4 77 00 10 00 00 - 84 00 00 00 90 00 00 00 @e.w............
00000000011ffed8 c0 fe 1f 01 ec 2c da f1 - dc ff 1f 01 a8 9a 83 7c .....,.........|
00000000011ffee8 b0 0a 81 7c ff ff ff ff - 14 00 00 00 01 00 00 00 ...|............
00000000011ffef8 00 00 00 00 00 00 00 00 - 10 00 00 00 00 a2 2f 4d ............../M
00000000011fff08 ff ff ff ff 00 10 00 00 - 00 60 fd 7f 00 e0 fd 7f .........`......
00000000011fff18 00 10 00 00 04 ff 1f 01 - d0 fe 1f 01 2c 66 e4 77 ............,f.w
00000000011fff28 02 00 00 00 c4 fe 1f 01 - 20 00 00 00 dc ff 1f 01 ........ .......
00000000011fff38 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 b4 ff 1f 01 ...|...|........
00000000011fff48 26 9b df 77 02 00 00 00 - 6c ff 1f 01 00 00 00 00 &..w....l.......
00000000011fff58 e0 93 04 00 01 00 00 00 - bb 40 91 7c 00 00 00 00 .........@.|....
00000000011fff68 00 00 00 00 84 00 00 00 - 90 00 00 00 00 10 00 00 ................
00000000011fff78 e0 2e f8 00 00 00 00 00 - 00 10 00 00 e8 3e f8 00 .............>..
00000000011fff88 a0 66 e4 77 68 00 00 00 - 80 66 e4 77 00 10 00 00 .f.wh....f.w....
00000000011fff98 00 00 00 00 00 00 00 00 - e0 2e f8 00 80 66 e4 77 .............f.w
00000000011fffa8 e5 03 00 00 00 10 00 00 - e8 3e f8 00 ec ff 1f 01 .........>......
00000000011fffb8 83 b6 80 7c 00 00 00 00 - bb 40 91 7c 00 00 00 00 ...|.....@.|....
00000000011fffc8 00 00 00 00 00 e0 fd 7f - 00 e6 7b 86 c0 ff 1f 01 ..........{.....
00000000011fffd8 58 0b d3 84 ff ff ff ff - a8 9a 83 7c 90 b6 80 7c X..........|...|
*----> State Dump for Thread Id 0x2c4 <----*
eax=00150001 ebx=0143fde8 ecx=001546a8 edx=00000001 esi=00000000 edi=7ffd6000
eip=7c90eb94 esp=0143fdc0 ebp=0143fe5c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\IEUI.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\msvcrt.dll -
ChildEBP RetAddr Args to Child
0143fe5c 7e4195f9 00000002 0143fe84 00000000 ntdll!KiFastSystemCallRet
0143feb8 5dff6029 00000001 0143feec ffffffff USER32!GetLastInputInfo+0x105
0143fed8 5dff93e4 000004ff ffffffff 00000001 IEUI!DUserRegisterSuper+0x9bd
0143ff0c 5dff98a6 0143ff4c 00000000 00000000 IEUI!SetGadgetParent+0x53d
0143ff2c 5dff9806 0143ff4c 00000000 00000000 IEUI!GetMessageExA+0x3d
0143ff80 77c3a3b0 00000000 7c910000 7c9131dc IEUI!SetGadgetParent+0x95f
0143ffb4 7c80b683 008c5230 7c910000 7c9131dc msvcrt!endthreadex+0xa9
0143ffec 00000000 77c3a341 008c5230 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000143fdc0 ab e9 90 7c e2 94 80 7c - 02 00 00 00 e8 fd 43 01 ...|...|......C.
000000000143fdd0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000143fde0 02 00 00 00 04 00 00 00 - 24 01 00 00 20 01 00 00 ........$... ...
000000000143fdf0 78 01 14 00 0c fe 43 01 - 79 a2 ff 5d b0 0e 01 68 x.....C.y..]...h
000000000143fe00 20 04 00 00 20 00 00 00 - 14 00 00 00 01 00 00 00 ... ...........
000000000143fe10 00 00 00 00 00 00 00 00 - 10 00 00 00 58 dd 12 00 ............X...
000000000143fe20 2c fe 43 01 c5 6f ff 5d - 00 60 fd 7f 00 d0 fd 7f ,.C..o.].`......
000000000143fe30 a2 6f ff 5d 00 00 00 00 - e8 fd 43 01 94 fe 43 01 .o.]......C...C.
000000000143fe40 02 00 00 00 dc fd 43 01 - 63 6f ff 5d a4 ff 43 01 ......C.co.]..C.
000000000143fe50 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 b8 fe 43 01 ...|...|......C.
000000000143fe60 f9 95 41 7e 02 00 00 00 - 84 fe 43 01 00 00 00 00 ..A~......C.....
000000000143fe70 ff ff ff ff 00 00 00 00 - ff ff ff ff 01 00 00 00 ................
000000000143fe80 01 00 00 00 24 01 00 00 - 20 01 00 00 bd 62 ff 5d ....$... ....b.]
000000000143fe90 20 9b 85 00 e8 46 15 00 - 01 00 00 00 00 00 00 00 ....F..........
000000000143fea0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000143feb0 00 d0 fd 7f 20 01 00 00 - d8 fe 43 01 29 60 ff 5d .... .....C.)`.]
000000000143fec0 01 00 00 00 ec fe 43 01 - ff ff ff ff ff 04 00 00 ......C.........
000000000143fed0 84 fe 43 01 30 46 15 00 - 0c ff 43 01 e4 93 ff 5d ..C.0F....C....]
000000000143fee0 ff 04 00 00 ff ff ff ff - 01 00 00 00 24 01 00 00 ............$...
000000000143fef0 00 00 00 00 00 00 00 00 - 30 52 8c 00 01 00 00 00 ........0R......
*----> State Dump for Thread Id 0x2c0 <----*
eax=00000000 ebx=00000000 ecx=7ffdc000 edx=00168e14 esi=00168dd8 edi=00000100
eip=7c90eb94 esp=01defe1c ebp=01deff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01deff80 77e76c22 01deffa8 77e76a3b 00168dd8 ntdll!KiFastSystemCallRet
01deff88 77e76a3b 00168dd8 0012e41c 0012df98 RPCRT4!I_RpcBCacheFree+0x5ea
01deffa8 77e76c0a 0014d528 01deffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
01deffb4 7c80b683 00181990 0012e41c 0012df98 RPCRT4!I_RpcBCacheFree+0x5d2
01deffec 00000000 77e76bf0 00181990 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001defe1c 99 e3 90 7c 03 67 e7 77 - d0 02 00 00 70 ff de 01 ...|.g.w....p...
0000000001defe2c 00 00 00 00 e0 d3 19 00 - 54 ff de 01 a8 b6 0e 86 ........T.......
0000000001defe3c 88 98 fd 85 b8 14 3b 86 - 28 fc 1f 86 e0 70 59 86 ......;.(....pY.
0000000001defe4c 28 70 59 86 71 75 54 52 - 40 ab da f1 5a 11 2f f7 (pY.quTR@...Z./.
0000000001defe5c 10 fc 1f 86 6c ab da f1 - 5c 0d 2f f7 28 70 59 86 ....l...\./.(pY.
0000000001defe6c 88 98 fd 85 95 0d 2f f7 - 88 98 fd 85 00 00 00 00 ....../.........
0000000001defe7c 30 c0 05 86 ec 70 59 86 - 10 fc 1f 86 1b 00 fc 85 0....pY.........
0000000001defe8c 8c ab da f1 fe 5d 2f f7 - 30 c0 05 86 28 70 59 86 .....]/.0...(pY.
0000000001defe9c 55 72 62 3c 03 01 00 00 - 01 00 00 00 88 98 fd 85 Urb<............
0000000001defeac b0 ab da f1 e2 f1 2d f7 - 30 c0 05 86 88 98 fd 85 ......-.0.......
0000000001defebc 88 98 fd 85 10 94 5a 86 - a0 16 3b 86 03 01 00 00 ......Z...;.....
0000000001defecc 9a f0 2d 01 c8 ab da f1 - d9 13 4e 80 40 99 fd 85 ..-.......N.@...
0000000001defedc 88 c1 05 86 a8 b6 0e 86 - 0a f5 8d f7 e8 ab da f1 ................
0000000001defeec d9 32 8e f7 1f 00 00 00 - 40 f5 df ff 0d ca 4d 80 .2......@.....M.
0000000001defefc ff ff ff ff 46 02 00 00 - 4d c8 4d 80 28 ac da f1 ....F...M.M.(...
0000000001deff0c 10 16 6c 85 20 f1 df ff - ac 17 6c 85 e8 1b 4e 80 ..l. .....l...N.
0000000001deff1c 80 16 6c 85 10 16 6c 85 - 1e 1c 4e 80 7c 17 6c 85 ..l...l...N.|.l.
0000000001deff2c 10 16 6c 85 80 ff de 01 - 99 66 e7 77 4c ff de 01 ..l......f.wL...
0000000001deff3c a9 66 e7 77 ed 10 90 7c - 28 0b 19 00 90 19 18 00 .f.w...|(.......
0000000001deff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0xbd8 <----*
eax=774fe429 ebx=00007530 ecx=7ffd6000 edx=00000000 esi=00000000 edi=01eeff50
eip=7c90eb94 esp=01eeff20 ebp=01eeff78 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr Args to Child
01eeff78 7c802451 0000ea60 00000000 01eeffb4 ntdll!KiFastSystemCallRet
01eeff88 774fe31d 0000ea60 00192fa8 774fe3dc kernel32!Sleep+0xf
01eeffb4 7c80b683 00192fa8 7c910945 7c91094e ole32!StringFromGUID2+0x51b
01eeffec 00000000 774fe429 00192fa8 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001eeff20 5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff ee 01 \..|.#.|....P...
0000000001eeff30 40 25 80 7c f8 6d 60 77 - 30 75 00 00 14 00 00 00 @%.|.m`w0u......
0000000001eeff40 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
0000000001eeff50 00 ba 3c dc ff ff ff ff - e4 fd ee 01 50 ff ee 01 ..<.........P...
0000000001eeff60 30 ff ee 01 34 fe ee 01 - dc ff ee 01 a8 9a 83 7c 0...4..........|
0000000001eeff70 58 24 80 7c 00 00 00 00 - 88 ff ee 01 51 24 80 7c X$.|........Q$.|
0000000001eeff80 60 ea 00 00 00 00 00 00 - b4 ff ee 01 1d e3 4f 77 `.............Ow
0000000001eeff90 60 ea 00 00 a8 2f 19 00 - dc e3 4f 77 00 00 00 00 `..../....Ow....
0000000001eeffa0 45 09 91 7c a8 2f 19 00 - 00 00 4e 77 44 e4 4f 77 E..|./....NwD.Ow
0000000001eeffb0 4e 09 91 7c ec ff ee 01 - 83 b6 80 7c a8 2f 19 00 N..|.......|./..
0000000001eeffc0 45 09 91 7c 4e 09 91 7c - a8 2f 19 00 00 b0 fd 7f E..|N..|./......
0000000001eeffd0 00 e6 7b 86 c0 ff ee 01 - e0 b1 68 85 ff ff ff ff ..{.......h.....
0000000001eeffe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000001eefff0 00 00 00 00 29 e4 4f 77 - a8 2f 19 00 00 00 00 00 ....).Ow./......
0000000001ef0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ef0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ef0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ef0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ef0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ef0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xd10 <----*
eax=7e903c60 ebx=00000000 ecx=01fefe44 edx=7c90eb94 esi=00190910 edi=00000000
eip=7c90eb94 esp=01feff50 ebp=01feffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01feffb4 7c80b683 0019d5f8 0012e48c 0012e5b4 ntdll!KiFastSystemCallRet
01feffec 00000000 00a53a37 00190910 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001feff50 18 94 41 7e 81 3e a5 00 - 8c e4 12 00 b4 e5 12 00 ..A~.>..........
0000000001feff60 10 09 19 00 74 04 29 00 - 13 01 00 00 01 00 00 00 ....t.).........
0000000001feff70 00 00 00 00 a9 bc 8a 00 - 02 03 00 00 93 00 00 00 ................
0000000001feff80 80 06 19 00 14 6c 19 00 - 01 00 00 00 00 00 00 00 .....l..........
0000000001feff90 58 7a 1a 00 01 00 00 00 - 00 00 00 00 54 03 2f 00 Xz..........T./.
0000000001feffa0 8e 01 37 00 68 d6 16 00 - 00 00 00 00 34 00 1a 00 ..7.h.......4...
0000000001feffb0 18 51 19 00 ec ff fe 01 - 83 b6 80 7c f8 d5 19 00 .Q.........|....
0000000001feffc0 8c e4 12 00 b4 e5 12 00 - 10 09 19 00 00 a0 fd 7f ................
0000000001feffd0 00 e6 7b 86 c0 ff fe 01 - a0 66 38 86 ff ff ff ff ..{......f8.....
0000000001feffe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000001fefff0 00 00 00 00 37 3a a5 00 - 10 09 19 00 00 00 00 00 ....7:..........
0000000001ff0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xef4 <----*
eax=77e76bf0 ebx=00000000 ecx=00000000 edx=00000000 esi=00168dd8 edi=00000100
eip=7c90eb94 esp=0214fe1c ebp=0214ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0214ff80 77e76c22 0214ffa8 77e76a3b 00168dd8 ntdll!KiFastSystemCallRet
0214ff88 77e76a3b 00168dd8 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
0214ffa8 77e76c0a 0014d528 0214ffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
0214ffb4 7c80b683 001964f8 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
0214ffec 00000000 77e76bf0 001964f8 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000214fe1c 99 e3 90 7c 03 67 e7 77 - d0 02 00 00 70 ff 14 02 ...|.g.w....p...
000000000214fe2c 00 00 00 00 50 35 18 00 - 54 ff 14 02 30 7b 6c f0 ....P5..T...0{l.
000000000214fe3c 01 00 00 00 38 7b 6c f0 - 00 00 00 00 05 c6 4d 80 ....8{l.......M.
000000000214fe4c 88 13 0b 86 02 13 0b 86 - 00 00 7c 86 00 00 00 00 ..........|.....
000000000214fe5c fc 4f 7c 86 00 13 0b 86 - cc 7b 6c f0 82 c2 56 80 .O|......{l...V.
000000000214fe6c 01 00 00 00 70 4e 7c 86 - 00 fc e0 ff 00 00 00 00 ....pN|.........
000000000214fe7c 9e ea 56 80 c8 75 dd 84 - 50 43 32 e1 00 00 00 00 ..V..u..PC2.....
000000000214fe8c e1 04 00 00 9c 7b 6c f0 - ec eb 56 80 50 43 32 e1 .....{l...V.PC2.
000000000214fe9c f0 02 00 00 78 8e d7 85 - 50 43 32 e1 f8 1b 7c 86 ....x...PC2...|.
000000000214feac a0 13 0b 86 03 00 00 00 - 50 43 32 e1 c4 7b 6c f0 ........PC2..{l.
000000000214febc ec eb 56 80 50 43 32 e1 - f8 02 00 00 ff 03 1f 00 ..V.PC2.........
000000000214fecc 50 43 32 e1 50 43 32 e1 - f8 02 00 00 00 00 00 00 PC2.PC2.........
000000000214fedc f0 25 0f e1 e0 7b 6c f0 - dc ec 56 80 50 43 32 e1 .%...{l...V.PC2.
000000000214feec f0 25 0f e1 ff 03 1f 00 - 70 4e 7c 86 50 43 32 e1 .%......pN|.PC2.
000000000214fefc 00 00 00 00 4e 8f 57 80 - d4 7c 6c f0 e4 8e 57 80 ....N.W..|l...W.
000000000214ff0c c8 75 dd 84 00 00 00 00 - 64 7d 6c f0 38 f5 ab f7 .u......d}l.8...
000000000214ff1c 66 c7 4d 80 00 5d e4 84 - 2f c5 4d 80 14 5f e4 84 f.M..]../.M.._..
000000000214ff2c a8 5d e4 84 80 ff 14 02 - 99 66 e7 77 4c ff 14 02 .].......f.wL...
000000000214ff3c a9 66 e7 77 ed 10 90 7c - 10 5e 19 00 f8 64 19 00 .f.w...|.^...d..
000000000214ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0xc10 <----*
eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=02f3fcec ebp=02f3ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
02f3ffb4 7c80b683 00000000 00140000 00000000 ntdll!KiFastSystemCallRet
02f3ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000002f3fcec ab e9 90 7c d5 a0 92 7c - 14 00 00 00 30 fd f3 02 ...|...|....0...
0000000002f3fcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 14 00 ................
0000000002f3fd0c 00 00 00 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c ...........|...|
0000000002f3fd1c 30 05 00 00 10 0c 00 00 - 14 00 00 00 14 00 00 00 0...............
0000000002f3fd2c 13 00 00 00 2c 05 00 00 - 60 03 00 00 7c 05 00 00 ....,...`...|...
0000000002f3fd3c a4 05 00 00 00 06 00 00 - 2c 06 00 00 4c 06 00 00 ........,...L...
0000000002f3fd4c 44 06 00 00 6c 05 00 00 - 98 05 00 00 b0 05 00 00 D...l...........
0000000002f3fd5c d0 05 00 00 d8 05 00 00 - e0 05 00 00 ec 05 00 00 ................
0000000002f3fd6c f4 05 00 00 0c 06 00 00 - 18 06 00 00 20 06 00 00 ............ ...
0000000002f3fd7c 38 06 00 00 84 09 00 00 - 54 0e 00 00 3c 07 00 00 8.......T...<...
0000000002f3fd8c 2c 0e 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ,...............
0000000002f3fd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x998 <----*
eax=769c8831 ebx=0303fef4 ecx=02c1db0c edx=02c1ddc0 esi=00000000 edi=7ffd6000
eip=7c90eb94 esp=0303fecc ebp=0303ff68 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\userenv.dll -
ChildEBP RetAddr Args to Child
0303ff68 7c80a075 00000003 76a60310 00000000 ntdll!KiFastSystemCallRet
0303ff84 769c888d 00000003 76a60310 00000000 kernel32!WaitForMultipleObjects+0x18
0303ffb4 7c80b683 00000000 00000000 00000000 userenv!UnregisterGPNotification+0x15c
0303ffec 00000000 769c8831 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000303fecc ab e9 90 7c e2 94 80 7c - 03 00 00 00 f4 fe 03 03 ...|...|........
000000000303fedc 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000303feec b8 03 a6 76 47 9b 80 7c - 80 05 00 00 84 05 00 00 ...vG..|........
000000000303fefc 88 05 00 00 5c fe 03 03 - 6c ff 03 03 6c ff 03 03 ....\...l...l...
000000000303ff0c 18 ee 90 7c 70 05 91 7c - 14 00 00 00 01 00 00 00 ...|p..|........
000000000303ff1c 00 00 00 00 00 00 00 00 - 10 00 00 00 f6 1b 80 7c ...............|
000000000303ff2c 00 00 00 00 00 00 00 00 - 00 60 fd 7f 00 40 fd 7f .........`...@..
000000000303ff3c 58 3a 14 00 00 00 00 00 - f4 fe 03 03 00 00 00 00 X:..............
000000000303ff4c 03 00 00 00 e8 fe 03 03 - 00 00 00 00 dc ff 03 03 ................
000000000303ff5c a8 9a 83 7c d8 95 80 7c - 00 00 00 00 84 ff 03 03 ...|...|........
000000000303ff6c 75 a0 80 7c 03 00 00 00 - 10 03 a6 76 00 00 00 00 u..|.......v....
000000000303ff7c ff ff ff ff 00 00 00 00 - b4 ff 03 03 8d 88 9c 76 ...............v
000000000303ff8c 03 00 00 00 10 03 a6 76 - 00 00 00 00 ff ff ff ff .......v........
000000000303ff9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 9c 76 ...............v
000000000303ffac 03 00 00 00 00 00 00 00 - ec ff 03 03 83 b6 80 7c ...............|
000000000303ffbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000303ffcc 00 40 fd 7f 00 c6 7b 86 - c0 ff 03 03 30 12 0a 86 .@....{.....0...
000000000303ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
000000000303ffec 00 00 00 00 00 00 00 00 - 31 88 9c 76 00 00 00 00 ........1..v....
000000000303fffc 00 00 00 00 ff ff ff ff - ff ff ff ff 00 00 00 00 ................
*----> State Dump for Thread Id 0x738 <----*
eax=2758242d ebx=0392fb98 ecx=02d20178 edx=01000000 esi=00000000 edi=7ffd6000
eip=7c90eb94 esp=0392fb70 ebp=0392fc0c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Common Files\Microsoft Shared\Windows Live\msidcrl40.dll -
ChildEBP RetAddr Args to Child
0392fc0c 7c80a075 00000003 0392fe4c 00000000 ntdll!KiFastSystemCallRet
0392fc28 2757cb49 00000003 0392fe4c 00000000 kernel32!WaitForMultipleObjects+0x18
0392ff4c 2757cd78 32e5f707 00000050 03060218 msidcrl40!SetUserExtendedProperty+0x36039
0392ff74 27582407 02d24078 32e5f7df 00000050 msidcrl40!SetUserExtendedProperty+0x36268
0392ffac 275824ac 03060218 7c80b683 02d240e0 msidcrl40!SetUserExtendedProperty+0x3b8f7
0392ffec 00000000 2758242d 02d240e0 00000000 msidcrl40!SetUserExtendedProperty+0x3b99c
*----> Raw Stack Dump <----*
000000000392fb70 ab e9 90 7c e2 94 80 7c - 03 00 00 00 98 fb 92 03 ...|...|........
000000000392fb80 01 00 00 00 00 00 00 00 - 00 00 00 00 03 00 00 00 ................
000000000392fb90 78 40 d2 02 e0 40 d2 02 - a4 06 00 00 a8 06 00 00 x@...@..........
000000000392fba0 9c 06 00 00 00 00 00 00 - 94 fb 92 03 18 ee 90 7c ...............|
000000000392fbb0 94 fc 92 03 77 90 9a 74 - 14 00 00 00 01 00 00 00 ....w..t........
000000000392fbc0 00 00 00 00 00 00 00 00 - 10 00 00 00 8d c5 99 74 ...............t
000000000392fbd0 02 00 00 00 f4 fb 92 03 - 00 60 fd 7f 00 f0 fa 7f .........`......
000000000392fbe0 c0 55 24 00 00 00 00 00 - 98 fb 92 03 01 00 00 00 .U$.............
000000000392fbf0 03 00 00 00 8c fb 92 03 - af c7 99 74 68 ff 92 03 ...........th...
000000000392fc00 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 28 fc 92 03 ...|...|....(...
000000000392fc10 75 a0 80 7c 03 00 00 00 - 4c fe 92 03 00 00 00 00 u..|....L.......
000000000392fc20 ff ff ff ff 00 00 00 00 - 4c ff 92 03 49 cb 57 27 ........L...I.W'
000000000392fc30 03 00 00 00 4c fe 92 03 - 00 00 00 00 ff ff ff ff ....L...........
000000000392fc40 50 00 00 00 18 02 06 03 - e0 40 d2 02 00 00 00 00 P........@......
000000000392fc50 00 00 00 00 00 00 00 00 - 00 00 00 00 c8 c9 5b 27 ..............['
000000000392fc60 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000392fc70 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000392fc80 00 60 fd 7f 00 00 00 00 - a4 1e 24 00 00 00 00 00 .`........$.....
000000000392fc90 00 00 00 00 00 00 00 00 - 18 ee 90 7c 00 00 00 00 ...........|....
000000000392fca0 ff ff ff ff 00 00 00 00 - c4 e8 90 7c 00 00 00 00 ...........|....
*----> State Dump for Thread Id 0x4dc <----*
eax=2758242d ebx=03a2fb98 ecx=77eda66e edx=00000000 esi=00000000 edi=7ffd6000
eip=7c90eb94 esp=03a2fb70 ebp=03a2fc0c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
03a2fc0c 7c80a075 00000003 03a2fe4c 00000000 ntdll!KiFastSystemCallRet
03a2fc28 2757cb49 00000003 03a2fe4c 00000000 kernel32!WaitForMultipleObjects+0x18
03a2ff4c 2757cd78 32d5f707 00000000 001402d8 msidcrl40!SetUserExtendedProperty+0x36039
03a2ff74 27582407 02d24560 32d5f7df 00000000 msidcrl40!SetUserExtendedProperty+0x36268
03a2ffac 275824ac 001402d8 7c80b683 02d240e0 msidcrl40!SetUserExtendedProperty+0x3b8f7
03a2ffec 00000000 2758242d 02d240e0 00000000 msidcrl40!SetUserExtendedProperty+0x3b99c
*----> Raw Stack Dump <----*
0000000003a2fb70 ab e9 90 7c e2 94 80 7c - 03 00 00 00 98 fb a2 03 ...|...|........
0000000003a2fb80 01 00 00 00 00 00 00 00 - 00 00 00 00 03 00 00 00 ................
0000000003a2fb90 60 45 d2 02 e0 40 d2 02 - b8 06 00 00 bc 06 00 00 `E...@..........
0000000003a2fba0 b0 06 00 00 00 00 00 00 - 94 fb a2 03 18 ee 90 7c ...............|
0000000003a2fbb0 94 fc a2 03 77 90 9a 74 - 14 00 00 00 01 00 00 00 ....w..t........
0000000003a2fbc0 00 00 00 00 00 00 00 00 - 10 00 00 00 8d c5 99 74 ...............t
0000000003a2fbd0 02 00 00 00 f4 fb a2 03 - 00 60 fd 7f 00 e0 fa 7f .........`......
0000000003a2fbe0 c0 55 24 00 00 00 00 00 - 98 fb a2 03 01 00 00 00 .U$.............
0000000003a2fbf0 03 00 00 00 8c fb a2 03 - af c7 99 74 68 ff a2 03 ...........th...
0000000003a2fc00 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 28 fc a2 03 ...|...|....(...
0000000003a2fc10 75 a0 80 7c 03 00 00 00 - 4c fe a2 03 00 00 00 00 u..|....L.......
0000000003a2fc20 ff ff ff ff 00 00 00 00 - 4c ff a2 03 49 cb 57 27 ........L...I.W'
0000000003a2fc30 03 00 00 00 4c fe a2 03 - 00 00 00 00 ff ff ff ff ....L...........
0000000003a2fc40 00 00 00 00 d8 02 14 00 - e0 40 d2 02 00 00 00 00 .........@......
0000000003a2fc50 00 00 00 00 00 00 00 00 - 00 00 00 00 a0 ba 5b 27 ..............['
0000000003a2fc60 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003a2fc70 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003a2fc80 00 60 fd 7f 00 00 00 00 - a4 1e 24 00 00 00 00 00 .`........$.....
0000000003a2fc90 00 00 00 00 00 00 00 00 - 18 ee 90 7c 00 00 00 00 ...........|....
0000000003a2fca0 ff ff ff ff 00 00 00 00 - c4 e8 90 7c 00 00 00 00 ...........|....
*----> State Dump for Thread Id 0x2ac <----*
eax=00000000 ebx=7c90e9b4 ecx=03b9fad4 edx=7c90eb94 esi=00000000 edi=00000001
eip=7c90eb94 esp=03b9fad4 ebp=03b9fb10 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\mswsock.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ws2_32.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WININET.dll -
ChildEBP RetAddr Args to Child
03b9fb10 71a55fa7 000006d4 000006f8 00000001 ntdll!KiFastSystemCallRet
03b9fc04 71ab2e67 00000001 03b9fe84 03b9fc7c mswsock+0x5fa7
03b9fc54 771d9346 00000001 03b9fe84 03b9fc7c ws2_32!select+0xa7
03b9ffac 771caccc 03b9ffec 7c80b683 030667c8 WININET!DetectAutoProxyUrl+0x5b9
03b9ffb4 7c80b683 030667c8 01fecca4 00140000 WININET!InternetOpenA+0x5ef
03b9ffec 00000000 771cacbf 030667c8 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000003b9fad4 c0 e9 90 7c a5 3c a5 71 - d4 06 00 00 01 00 00 00 ...|.<.q........
0000000003b9fae4 fc fa b9 03 b4 fb b9 03 - 84 fe b9 03 a4 fb b9 03 ................
0000000003b9faf4 d4 06 00 00 ef d8 90 7c - c0 b4 b3 ff ff ff ff ff .......|........
0000000003b9fb04 b0 02 06 03 00 00 00 00 - 00 00 00 00 04 fc b9 03 ................
0000000003b9fb14 a7 5f a5 71 d4 06 00 00 - f8 06 00 00 01 00 00 00 ._.q............
0000000003b9fb24 04 00 00 00 80 fd b9 03 - 40 61 b9 01 7c fc b9 03 ........@a..|...
0000000003b9fb34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003b9fb44 01 00 00 00 80 0f 05 fd - ff ff ff ff dc fb b9 03 ................
0000000003b9fb54 01 00 00 00 00 00 00 00 - a0 00 00 00 00 00 00 00 ................
0000000003b9fb64 00 00 00 00 03 01 00 00 - 00 00 00 00 d4 06 00 00 ................
0000000003b9fb74 38 fc b9 03 00 00 00 00 - 00 00 00 00 1c 00 00 00 8...............
0000000003b9fb84 b0 02 06 03 c0 fb b9 03 - 7c fc b9 03 80 fd b9 03 ........|.......
0000000003b9fb94 00 00 00 00 a4 fb b9 03 - 00 00 00 00 00 00 00 00 ................
0000000003b9fba4 80 0f 05 fd ff ff ff ff - 01 00 00 00 00 fb b9 03 ................
0000000003b9fbb4 f8 06 00 00 19 00 00 00 - 00 fc b9 03 32 2b ab 71 ............2+.q
0000000003b9fbc4 e8 71 b9 01 ec fb b9 03 - 17 62 ab 71 33 27 00 00 .q.......b.q3'..
0000000003b9fbd4 68 df a6 08 01 00 00 00 - 01 00 00 00 1f fc b9 03 h...............
0000000003b9fbe4 58 60 b9 01 9e 08 00 00 - 28 fb b9 03 0c 15 aa 71 X`......(......q
0000000003b9fbf4 44 fc b9 03 c8 71 a7 71 - 68 2e a5 71 ff ff ff ff D....q.qh..q....
0000000003b9fc04 54 fc b9 03 67 2e ab 71 - 01 00 00 00 84 fe b9 03 T...g..q........
*----> State Dump for Thread Id 0x4fc <----*
eax=000000c0 ebx=00000000 ecx=7c800000 edx=00000000 esi=01fec300 edi=02080000
eip=7c90eb94 esp=03cdff9c ebp=03cdffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
03cdffb4 7c80b683 00000000 02080000 01fec300 ntdll!KiFastSystemCallRet
03cdffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000003cdff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff cd 03 \..|.y.|........
0000000003cdffac 00 00 00 00 00 00 00 80 - ec ff cd 03 83 b6 80 7c ...............|
0000000003cdffbc 00 00 00 00 00 00 08 02 - 00 c3 fe 01 00 00 00 00 ................
0000000003cdffcc 00 c0 fa 7f 00 e6 7b 86 - c0 ff cd 03 28 9a f2 85 ......{.....(...
0000000003cdffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
0000000003cdffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
0000000003cdfffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce00ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce00bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce00cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xa60 <----*
eax=0892fab8 ebx=c0000000 ecx=00000020 edx=00000000 esi=00000000 edi=71a87558
eip=7c90eb94 esp=03f1ff7c ebp=03f1ffb4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
03f1ffb4 7c80b683 71a5d8ec 03ddf67c 7c90ee18 ntdll!KiFastSystemCallRet
03f1ffec 00000000 71a5d5af 001c2738 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000003f1ff7c 1b e3 90 7c 09 d6 a5 71 - b8 07 00 00 bc ff f1 03 ...|...q........
0000000003f1ff8c b0 ff f1 03 a4 ff f1 03 - 50 d6 a5 71 7c f6 dd 03 ........P..q|...
0000000003f1ff9c 18 ee 90 7c 38 27 1c 00 - 00 00 00 00 00 00 00 00 ...|8'..........
0000000003f1ffac 00 00 a5 71 d0 27 ba 03 - ec ff f1 03 83 b6 80 7c ...q.'.........|
0000000003f1ffbc ec d8 a5 71 7c f6 dd 03 - 18 ee 90 7c 38 27 1c 00 ...q|......|8'..
0000000003f1ffcc 00 80 fd 7f 00 c6 7b 86 - c0 ff f1 03 00 56 b9 84 ......{......V..
0000000003f1ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
0000000003f1ffec 00 00 00 00 00 00 00 00 - af d5 a5 71 38 27 1c 00 ...........q8'..
0000000003f1fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f200ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x394 <----*
eax=00001687 ebx=00000000 ecx=0625b598 edx=0441fe30 esi=0000091c edi=00000000
eip=7c90eb94 esp=0441ff10 ebp=0441ff74 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\mshtml.dll -
ChildEBP RetAddr Args to Child
0441ff74 7c802532 0000091c 000927c0 00000000 ntdll!KiFastSystemCallRet
0441ff88 7e8c452f 0000091c 000927c0 7e830000 kernel32!WaitForSingleObject+0x12
0441ffb4 7c80b683 04035920 ffffffff 7c9106eb mshtml!DllGetClassObject+0x79744
0441ffec 00000000 7e84a6fa 04035920 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000441ff10 c0 e9 90 7c cb 25 80 7c - 1c 09 00 00 00 00 00 00 ...|.%.|........
000000000441ff20 44 ff 41 04 00 00 00 00 - 20 59 03 04 00 00 00 00 D.A..... Y......
000000000441ff30 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000441ff40 10 00 00 00 00 44 5f 9a - fe ff ff ff 00 60 fd 7f .....D_......`..
000000000441ff50 00 90 fa 7f 44 ff 41 04 - 00 00 00 00 24 ff 41 04 ....D.A.....$.A.
000000000441ff60 90 99 85 7e dc ff 41 04 - a8 9a 83 7c f8 25 80 7c ...~..A....|.%.|
000000000441ff70 00 00 00 00 88 ff 41 04 - 32 25 80 7c 1c 09 00 00 ......A.2%.|....
000000000441ff80 c0 27 09 00 00 00 00 00 -
Application exception occurred:
App: C:\Program Files\Internet Explorer\iexplore.exe (pid=1968)
When: 5/19/2007 @ 21:10:03.593
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: UPSTAIRS
User Name: Peter
Terminal Session Id: 0
Number of Processors: 2
Processor Type: x86 Family 15 Model 4 Stepping 1
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Multiprocessor Free
Registered Organization: home use
Registered Owner: peter
*----> Task List <----*
0 System Process
4 System
1044 smss.exe
1092 csrss.exe
1116 winlogon.exe
1160 services.exe
1172 lsass.exe
1344 svchost.exe
1392 svchost.exe
1536 svchost.exe
1576 fws.exe
1624 svchost.exe
1804 svchost.exe
388 spoolsv.exe
540 aswUpdSv.exe
556 ashServ.exe
608 avgamsvr.exe
616 avgupsvc.exe
648 avgemc.exe
668 dvpapi.exe
1452 Explorer.EXE
1744 SMAgent.exe
1900 svchost.exe
1240 ashMaiSv.exe
1560 ashWebSv.exe
2172 alg.exe
2896 avgcc.exe
2912 RPS.exe
2932 ashDisp.exe
2968 SMax4PNP.exe
3068 Smax4.exe
3080 AsusProb.exe
3092 jusched.exe
3100 pg2.exe
3124 ctfmon.exe
3400 svchost.exe
1968 iexplore.exe
2748 WLLoginProxy.exe
1000 dwwin.exe
3724 drwtsn32.exe
*----> Module List <----*
(0000000000400000 - 000000000049a000: C:\Program Files\Internet Explorer\iexplore.exe
(00000000009b0000 - 0000000000f79000: C:\WINDOWS\system32\IEFRAME.dll
(00000000018d0000 - 00000000018d9000: C:\WINDOWS\system32\Normaliz.dll
(0000000002150000 - 0000000002416000: C:\WINDOWS\system32\msi.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 0000000010008000: C:\Program Files\Adobe\Acrobat 5.0\Reader\ActiveX\AcroIEHelper.ocx
(000000001b000000 - 000000001b00c000: C:\WINDOWS\system32\ImgUtil.dll
(000000001b060000 - 000000001b06e000: C:\WINDOWS\system32\pngfilt.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(0000000027500000 - 00000000275c8000: C:\Program Files\Common Files\Microsoft Shared\Windows Live\msidcrl40.dll
(0000000029500000 - 0000000029551000: C:\Program Files\Common Files\Microsoft Shared\Windows Live\WindowsLiveLogin.dll
(0000000030000000 - 00000000302ef000: C:\WINDOWS\system32\Macromed\Flash\Flash9c.ocx
(0000000047060000 - 0000000047081000: C:\WINDOWS\system32\xmllite.dll
(000000004d4f0000 - 000000004d548000: C:\WINDOWS\system32\WINHTTP.dll
(000000004ec50000 - 000000004edf3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_65 95b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(0000000058760000 - 0000000058792000: C:\WINDOWS\system32\iepeers.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\netapi32.dll
(000000005d090000 - 000000005d12a000: C:\WINDOWS\system32\comctl32.dll
(000000005dca0000 - 000000005dce5000: C:\WINDOWS\system32\iertutil.dll
(000000005dff0000 - 000000005e01f000: C:\WINDOWS\system32\IEUI.dll
(0000000060080000 - 00000000600cd000: C:\Program Files\ntl\ntl Netguard\ClBR.dll
(0000000060100000 - 0000000060115000: C:\Program Files\ntl\ntl Netguard\CstmUIR.dll
(0000000060170000 - 0000000060193000: C:\Program Files\ntl\ntl Netguard\FBHR.dll
(0000000060210000 - 000000006023b000: C:\Program Files\ntl\ntl Netguard\inhR.dll
(0000000060270000 - 0000000060286000: C:\Program Files\ntl\ntl Netguard\LbZkTstR.dll
(00000000602c0000 - 00000000602cc000: C:\Program Files\ntl\ntl Netguard\LibZkR.dll
(00000000602e0000 - 00000000602e9000: C:\Program Files\ntl\ntl Netguard\OemLibR.dll
(0000000060330000 - 000000006034d000: C:\Program Files\ntl\ntl Netguard\PersistR.dll
(0000000060350000 - 000000006035e000: C:\Program Files\ntl\ntl Netguard\pkR.dll
(00000000606b0000 - 00000000606cf000: C:\Program Files\ntl\ntl Netguard\Resources\zk_en_US\ClB_Rsrc.dll
(0000000060730000 - 0000000060733000: C:\Program Files\ntl\ntl Netguard\Resources\zk_en_US\FBH_Rsrc.dll
(0000000060770000 - 000000006078f000: C:\Program Files\ntl\ntl Netguard\Resources\zk_en_US\inh_Rsrc.dll
(0000000061410000 - 0000000061534000: C:\WINDOWS\system32\urlmon.dll
(0000000061930000 - 000000006197a000: C:\Program Files\Internet Explorer\ieproxy.dll
(0000000063380000 - 00000000633f8000: C:\WINDOWS\System32\jscript.dll
(0000000063400000 - 0000000063433000: C:\WINDOWS\system32\MSRATING.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000069b10000 - 0000000069c42000: c:\WINDOWS\system32\msxml4.dll
(000000006d430000 - 000000006d43a000: C:\WINDOWS\System32\ddrawex.dll
(000000006d7c0000 - 000000006d839000: C:\Program Files\Java\jre1.6.0_01\bin\ssv.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\system32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\ws2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\system32\actxprxy.dll
(00000000722b0000 - 00000000722b5000: C:\WINDOWS\system32\SensApi.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(0000000072ea0000 - 0000000072f00000: C:\WINDOWS\system32\ieapfltr.dll
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000073760000 - 00000000737a9000: C:\WINDOWS\System32\DDRAW.dll
(0000000073b30000 - 0000000073b45000: C:\WINDOWS\system32\mscms.dll
(0000000073bc0000 - 0000000073bc6000: C:\WINDOWS\System32\DCIMAN32.dll
(00000000746c0000 - 00000000746e9000: C:\WINDOWS\system32\msls31.dll
(00000000746f0000 - 000000007471a000: C:\WINDOWS\System32\msimtf.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000074980000 - 0000000074a8e000: C:\WINDOWS\System32\msxml3.dll
(0000000074d90000 - 0000000074dfb000: C:\WINDOWS\system32\USP10.dll
(00000000755c0000 - 00000000755ee000: C:\WINDOWS\system32\msctfime.ime
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\MLANG.dll
(0000000075e60000 - 0000000075e73000: C:\WINDOWS\system32\cryptnet.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000076200000 - 0000000076277000: C:\WINDOWS\system32\mshtmled.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\MSIMG32.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(00000000767f0000 - 0000000076817000: C:\WINDOWS\system32\schannel.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\userenv.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076bf0000 - 0000000076bfb000: C:\WINDOWS\system32\PSAPI.DLL
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.dll
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: C:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 000000007727e000: C:\WINDOWS\system32\WININET.dll
(00000000773d0000 - 00000000774d3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077690000 - 00000000776b1000: C:\WINDOWS\system32\NTMARTA.DLL
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\apphelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(000000007c120000 - 000000007c139000: C:\Program Files\ntl\ntl Netguard\ATL71.DLL
(000000007c140000 - 000000007c243000: C:\Program Files\ntl\ntl Netguard\MFC71.DLL
(000000007c340000 - 000000007c396000: C:\Program Files\ntl\ntl Netguard\MSVCR71.dll
(000000007c3a0000 - 000000007c41b000: C:\Program Files\ntl\ntl Netguard\MSVCP71.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll
(000000007e410000 - 000000007e4a0000: C:\WINDOWS\system32\USER32.dll
(000000007e830000 - 000000007eb9f000: C:\WINDOWS\system32\mshtml.dll
*----> State Dump for Thread Id 0x5d4 <----*
eax=00000001 ebx=00000000 ecx=00000030 edx=00000030 esi=000002b7 edi=000001be
eip=7c90eb94 esp=0012e2f8 ebp=0012e380 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\IEFRAME.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
*** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\Internet Explorer\iexplore.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0012e380 00b7f626 00000000 000c026c 00000000 ntdll!KiFastSystemCallRet
0012e404 00b5605c 000c026c 00000000 00000000 IEFRAME+0x1cf626
0012e424 00b560e8 0012e7bc 000c026c 00000110 IEFRAME!Ordinal102+0x1e77c
0012e448 7e418734 000c026c 00000110 0005025a IEFRAME!Ordinal102+0x1e808
0012e474 7e423b9c 00b560a2 000c026c 00000110 USER32!GetDC+0x6d
0012e4e0 7e423591 00147e10 00b560a2 000c026c USER32!DefDlgProcW+0x402
0012e528 7e4237bc 00000000 00000110 0005025a USER32!PrivateExtractIconExW+0xfe
0012e544 7e418734 000c026c 00000110 0005025a USER32!DefDlgProcW+0x22
0012e570 7e418816 7e42379a 000c026c 00000110 USER32!GetDC+0x6d
0012e5d8 7e41b89b 00147e10 7e42379a 000c026c USER32!GetDC+0x14f
0012e614 7e4243e0 0067bdc0 005fea80 0005025a USER32!GetParent+0x16c
0012e6cc 7e42592c 00000000 0067bdc0 00000000 USER32!GetWindowTextLengthW+0x547
0012e700 7e425981 01200001 012a5230 0037018e USER32!DrawStateW+0x1df
0012e720 7e42559e 01200001 012a5230 0037018e USER32!DialogBoxIndirectParamAorW+0x36
0012e744 009c5442 01200001 00007900 0037018e USER32!DialogBoxParamW+0x3f
0012e764 009c5600 01200001 00007900 0037018e IEFRAME!Ordinal165+0x3750
0012e788 00b56121 01200001 00007900 0037018e IEFRAME!Ordinal165+0x390e
0012e7a8 00a97fd4 0037018e 00000000 0014fef0 IEFRAME!Ordinal102+0x1e841
0012e7d4 00a75d8c 00a5c62c 0012e814 00a75d6f IEFRAME!Ordinal160+0x19ae2
0012e7e0 00a75d6f 00000001 0014cf78 0014f860 IEFRAME!Ordinal101+0x4e28
0012e814 00a6fd55 0014fef0 0012e844 00a712af IEFRAME!Ordinal101+0x4e0b
0012e820 00a712af 00000000 00000000 0014cf78 IEFRAME!SetQueryNetSessionCount+0xa731
0012e844 00a711fd 15d4000a 0014cf78 00000000 IEFRAME!Ordinal101+0x34b
0012f8b4 00a710ad 0014cf78 77f648d4 00000000 IEFRAME!Ordinal101+0x299
0012faec 00402ead 00146ae8 00000001 0040f070 IEFRAME!Ordinal101+0x149
0012ff2c 00402d3a 00400000 00000000 0002070c iexplore+0x2ead
0012ffc0 7c816fd7 00fdcecc 7c90e1fe 7ffd6000 iexplore+0x2d3a
0012fff0 00000000 00402bc5 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49
*----> Raw Stack Dump <----*
000000000012e2f8 27 c0 41 7e 12 e3 b7 00 - 6c 02 0c 00 00 00 00 00 '.A~....l.......
000000000012e308 b7 02 00 00 be 01 00 00 - 58 01 00 00 a5 00 00 00 ........X.......
000000000012e318 05 00 00 00 8e 01 37 00 - 00 00 00 00 d4 b6 41 7e ......7.......A~
000000000012e328 28 00 00 00 00 00 00 00 - 00 00 00 00 40 06 00 00 (...........@...
000000000012e338 b0 04 00 00 00 00 00 00 - 00 00 00 00 40 06 00 00 ............@...
000000000012e348 70 04 00 00 01 00 00 00 - fc 84 41 7e a4 85 41 7e p.........A~..A~
000000000012e358 6c 02 0c 00 01 00 00 00 - a5 00 00 00 20 00 00 00 l........... ...
000000000012e368 22 06 00 00 02 04 00 00 - b7 02 00 00 be 01 00 00 "...............
000000000012e378 0f 04 00 00 63 02 00 00 - 04 e4 12 00 26 f6 b7 00 ....c.......&...
000000000012e388 00 00 00 00 6c 02 0c 00 - 00 00 00 00 b7 02 00 00 ....l...........
000000000012e398 be 01 00 00 00 00 00 00 - 00 00 00 00 05 00 00 00 ................
000000000012e3a8 01 00 00 00 6c 02 0c 00 - bc e7 12 00 45 5d 42 7e ....l.......E]B~
000000000012e3b8 01 00 00 00 f4 e3 12 00 - 00 00 00 00 ba b8 41 7e ..............A~
000000000012e3c8 0c e4 12 00 33 4d b5 00 - 82 01 11 00 93 bb 12 00 ....3M..........
000000000012e3d8 0c e4 12 00 3b 4d b5 00 - a9 00 00 00 3e 00 00 00 ....;M......>...
000000000012e3e8 01 02 00 00 e3 00 00 00 - a5 00 00 00 20 00 00 00 ............ ...
000000000012e3f8 22 06 00 00 02 04 00 00 - 8e 01 37 00 24 e4 12 00 ".........7.$...
000000000012e408 5c 60 b5 00 6c 02 0c 00 - 00 00 00 00 00 00 00 00 \`..l...........
000000000012e418 bc e7 12 00 5a 02 05 00 - 00 00 00 00 48 e4 12 00 ....Z.......H...
000000000012e428 e8 60 b5 00 bc e7 12 00 - 6c 02 0c 00 10 01 00 00 .`......l.......
*----> State Dump for Thread Id 0x4f4 <----*
eax=77df9981 ebx=011ffed0 ecx=00000006 edx=00000000 esi=00000000 edi=7ffd6000
eip=7c90eb94 esp=011ffea8 ebp=011fff44 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ADVAPI32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
011fff44 77df9b26 00000002 011fff6c 00000000 ntdll!KiFastSystemCallRet
011fffb4 7c80b683 00000000 7c9140bb 00000000 ADVAPI32!RegDeleteKeyW+0x2a2
011fffec 00000000 77df9981 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
00000000011ffea8 ab e9 90 7c e2 94 80 7c - 02 00 00 00 d0 fe 1f 01 ...|...|........
00000000011ffeb8 01 00 00 00 01 00 00 00 - 04 ff 1f 01 e0 2e f8 00 ................
00000000011ffec8 40 65 e4 77 00 10 00 00 - 84 00 00 00 90 00 00 00 @e.w............
00000000011ffed8 c0 fe 1f 01 ec 2c da f1 - dc ff 1f 01 a8 9a 83 7c .....,.........|
00000000011ffee8 b0 0a 81 7c ff ff ff ff - 14 00 00 00 01 00 00 00 ...|............
00000000011ffef8 00 00 00 00 00 00 00 00 - 10 00 00 00 00 a2 2f 4d ............../M
00000000011fff08 ff ff ff ff 00 10 00 00 - 00 60 fd 7f 00 e0 fd 7f .........`......
00000000011fff18 00 10 00 00 04 ff 1f 01 - d0 fe 1f 01 2c 66 e4 77 ............,f.w
00000000011fff28 02 00 00 00 c4 fe 1f 01 - 20 00 00 00 dc ff 1f 01 ........ .......
00000000011fff38 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 b4 ff 1f 01 ...|...|........
00000000011fff48 26 9b df 77 02 00 00 00 - 6c ff 1f 01 00 00 00 00 &..w....l.......
00000000011fff58 e0 93 04 00 01 00 00 00 - bb 40 91 7c 00 00 00 00 .........@.|....
00000000011fff68 00 00 00 00 84 00 00 00 - 90 00 00 00 00 10 00 00 ................
00000000011fff78 e0 2e f8 00 00 00 00 00 - 00 10 00 00 e8 3e f8 00 .............>..
00000000011fff88 a0 66 e4 77 68 00 00 00 - 80 66 e4 77 00 10 00 00 .f.wh....f.w....
00000000011fff98 00 00 00 00 00 00 00 00 - e0 2e f8 00 80 66 e4 77 .............f.w
00000000011fffa8 e5 03 00 00 00 10 00 00 - e8 3e f8 00 ec ff 1f 01 .........>......
00000000011fffb8 83 b6 80 7c 00 00 00 00 - bb 40 91 7c 00 00 00 00 ...|.....@.|....
00000000011fffc8 00 00 00 00 00 e0 fd 7f - 00 e6 7b 86 c0 ff 1f 01 ..........{.....
00000000011fffd8 58 0b d3 84 ff ff ff ff - a8 9a 83 7c 90 b6 80 7c X..........|...|
*----> State Dump for Thread Id 0x2c4 <----*
eax=00150001 ebx=0143fde8 ecx=001546a8 edx=00000001 esi=00000000 edi=7ffd6000
eip=7c90eb94 esp=0143fdc0 ebp=0143fe5c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\IEUI.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\msvcrt.dll -
ChildEBP RetAddr Args to Child
0143fe5c 7e4195f9 00000002 0143fe84 00000000 ntdll!KiFastSystemCallRet
0143feb8 5dff6029 00000001 0143feec ffffffff USER32!GetLastInputInfo+0x105
0143fed8 5dff93e4 000004ff ffffffff 00000001 IEUI!DUserRegisterSuper+0x9bd
0143ff0c 5dff98a6 0143ff4c 00000000 00000000 IEUI!SetGadgetParent+0x53d
0143ff2c 5dff9806 0143ff4c 00000000 00000000 IEUI!GetMessageExA+0x3d
0143ff80 77c3a3b0 00000000 7c910000 7c9131dc IEUI!SetGadgetParent+0x95f
0143ffb4 7c80b683 008c5230 7c910000 7c9131dc msvcrt!endthreadex+0xa9
0143ffec 00000000 77c3a341 008c5230 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000143fdc0 ab e9 90 7c e2 94 80 7c - 02 00 00 00 e8 fd 43 01 ...|...|......C.
000000000143fdd0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000143fde0 02 00 00 00 04 00 00 00 - 24 01 00 00 20 01 00 00 ........$... ...
000000000143fdf0 78 01 14 00 0c fe 43 01 - 79 a2 ff 5d b0 0e 01 68 x.....C.y..]...h
000000000143fe00 20 04 00 00 20 00 00 00 - 14 00 00 00 01 00 00 00 ... ...........
000000000143fe10 00 00 00 00 00 00 00 00 - 10 00 00 00 58 dd 12 00 ............X...
000000000143fe20 2c fe 43 01 c5 6f ff 5d - 00 60 fd 7f 00 d0 fd 7f ,.C..o.].`......
000000000143fe30 a2 6f ff 5d 00 00 00 00 - e8 fd 43 01 94 fe 43 01 .o.]......C...C.
000000000143fe40 02 00 00 00 dc fd 43 01 - 63 6f ff 5d a4 ff 43 01 ......C.co.]..C.
000000000143fe50 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 b8 fe 43 01 ...|...|......C.
000000000143fe60 f9 95 41 7e 02 00 00 00 - 84 fe 43 01 00 00 00 00 ..A~......C.....
000000000143fe70 ff ff ff ff 00 00 00 00 - ff ff ff ff 01 00 00 00 ................
000000000143fe80 01 00 00 00 24 01 00 00 - 20 01 00 00 bd 62 ff 5d ....$... ....b.]
000000000143fe90 20 9b 85 00 e8 46 15 00 - 01 00 00 00 00 00 00 00 ....F..........
000000000143fea0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000143feb0 00 d0 fd 7f 20 01 00 00 - d8 fe 43 01 29 60 ff 5d .... .....C.)`.]
000000000143fec0 01 00 00 00 ec fe 43 01 - ff ff ff ff ff 04 00 00 ......C.........
000000000143fed0 84 fe 43 01 30 46 15 00 - 0c ff 43 01 e4 93 ff 5d ..C.0F....C....]
000000000143fee0 ff 04 00 00 ff ff ff ff - 01 00 00 00 24 01 00 00 ............$...
000000000143fef0 00 00 00 00 00 00 00 00 - 30 52 8c 00 01 00 00 00 ........0R......
*----> State Dump for Thread Id 0x2c0 <----*
eax=00000000 ebx=00000000 ecx=7ffdc000 edx=00168e14 esi=00168dd8 edi=00000100
eip=7c90eb94 esp=01defe1c ebp=01deff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01deff80 77e76c22 01deffa8 77e76a3b 00168dd8 ntdll!KiFastSystemCallRet
01deff88 77e76a3b 00168dd8 0012e41c 0012df98 RPCRT4!I_RpcBCacheFree+0x5ea
01deffa8 77e76c0a 0014d528 01deffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
01deffb4 7c80b683 00181990 0012e41c 0012df98 RPCRT4!I_RpcBCacheFree+0x5d2
01deffec 00000000 77e76bf0 00181990 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001defe1c 99 e3 90 7c 03 67 e7 77 - d0 02 00 00 70 ff de 01 ...|.g.w....p...
0000000001defe2c 00 00 00 00 e0 d3 19 00 - 54 ff de 01 a8 b6 0e 86 ........T.......
0000000001defe3c 88 98 fd 85 b8 14 3b 86 - 28 fc 1f 86 e0 70 59 86 ......;.(....pY.
0000000001defe4c 28 70 59 86 71 75 54 52 - 40 ab da f1 5a 11 2f f7 (pY.quTR@...Z./.
0000000001defe5c 10 fc 1f 86 6c ab da f1 - 5c 0d 2f f7 28 70 59 86 ....l...\./.(pY.
0000000001defe6c 88 98 fd 85 95 0d 2f f7 - 88 98 fd 85 00 00 00 00 ....../.........
0000000001defe7c 30 c0 05 86 ec 70 59 86 - 10 fc 1f 86 1b 00 fc 85 0....pY.........
0000000001defe8c 8c ab da f1 fe 5d 2f f7 - 30 c0 05 86 28 70 59 86 .....]/.0...(pY.
0000000001defe9c 55 72 62 3c 03 01 00 00 - 01 00 00 00 88 98 fd 85 Urb<............
0000000001defeac b0 ab da f1 e2 f1 2d f7 - 30 c0 05 86 88 98 fd 85 ......-.0.......
0000000001defebc 88 98 fd 85 10 94 5a 86 - a0 16 3b 86 03 01 00 00 ......Z...;.....
0000000001defecc 9a f0 2d 01 c8 ab da f1 - d9 13 4e 80 40 99 fd 85 ..-.......N.@...
0000000001defedc 88 c1 05 86 a8 b6 0e 86 - 0a f5 8d f7 e8 ab da f1 ................
0000000001defeec d9 32 8e f7 1f 00 00 00 - 40 f5 df ff 0d ca 4d 80 .2......@.....M.
0000000001defefc ff ff ff ff 46 02 00 00 - 4d c8 4d 80 28 ac da f1 ....F...M.M.(...
0000000001deff0c 10 16 6c 85 20 f1 df ff - ac 17 6c 85 e8 1b 4e 80 ..l. .....l...N.
0000000001deff1c 80 16 6c 85 10 16 6c 85 - 1e 1c 4e 80 7c 17 6c 85 ..l...l...N.|.l.
0000000001deff2c 10 16 6c 85 80 ff de 01 - 99 66 e7 77 4c ff de 01 ..l......f.wL...
0000000001deff3c a9 66 e7 77 ed 10 90 7c - 28 0b 19 00 90 19 18 00 .f.w...|(.......
0000000001deff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0xbd8 <----*
eax=774fe429 ebx=00007530 ecx=7ffd6000 edx=00000000 esi=00000000 edi=01eeff50
eip=7c90eb94 esp=01eeff20 ebp=01eeff78 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr Args to Child
01eeff78 7c802451 0000ea60 00000000 01eeffb4 ntdll!KiFastSystemCallRet
01eeff88 774fe31d 0000ea60 00192fa8 774fe3dc kernel32!Sleep+0xf
01eeffb4 7c80b683 00192fa8 7c910945 7c91094e ole32!StringFromGUID2+0x51b
01eeffec 00000000 774fe429 00192fa8 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001eeff20 5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff ee 01 \..|.#.|....P...
0000000001eeff30 40 25 80 7c f8 6d 60 77 - 30 75 00 00 14 00 00 00 @%.|.m`w0u......
0000000001eeff40 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
0000000001eeff50 00 ba 3c dc ff ff ff ff - e4 fd ee 01 50 ff ee 01 ..<.........P...
0000000001eeff60 30 ff ee 01 34 fe ee 01 - dc ff ee 01 a8 9a 83 7c 0...4..........|
0000000001eeff70 58 24 80 7c 00 00 00 00 - 88 ff ee 01 51 24 80 7c X$.|........Q$.|
0000000001eeff80 60 ea 00 00 00 00 00 00 - b4 ff ee 01 1d e3 4f 77 `.............Ow
0000000001eeff90 60 ea 00 00 a8 2f 19 00 - dc e3 4f 77 00 00 00 00 `..../....Ow....
0000000001eeffa0 45 09 91 7c a8 2f 19 00 - 00 00 4e 77 44 e4 4f 77 E..|./....NwD.Ow
0000000001eeffb0 4e 09 91 7c ec ff ee 01 - 83 b6 80 7c a8 2f 19 00 N..|.......|./..
0000000001eeffc0 45 09 91 7c 4e 09 91 7c - a8 2f 19 00 00 b0 fd 7f E..|N..|./......
0000000001eeffd0 00 e6 7b 86 c0 ff ee 01 - e0 b1 68 85 ff ff ff ff ..{.......h.....
0000000001eeffe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000001eefff0 00 00 00 00 29 e4 4f 77 - a8 2f 19 00 00 00 00 00 ....).Ow./......
0000000001ef0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ef0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ef0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ef0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ef0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ef0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xd10 <----*
eax=7e903c60 ebx=00000000 ecx=01fefe44 edx=7c90eb94 esi=00190910 edi=00000000
eip=7c90eb94 esp=01feff50 ebp=01feffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01feffb4 7c80b683 0019d5f8 0012e48c 0012e5b4 ntdll!KiFastSystemCallRet
01feffec 00000000 00a53a37 00190910 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001feff50 18 94 41 7e 81 3e a5 00 - 8c e4 12 00 b4 e5 12 00 ..A~.>..........
0000000001feff60 10 09 19 00 74 04 29 00 - 13 01 00 00 01 00 00 00 ....t.).........
0000000001feff70 00 00 00 00 a9 bc 8a 00 - 02 03 00 00 93 00 00 00 ................
0000000001feff80 80 06 19 00 14 6c 19 00 - 01 00 00 00 00 00 00 00 .....l..........
0000000001feff90 58 7a 1a 00 01 00 00 00 - 00 00 00 00 54 03 2f 00 Xz..........T./.
0000000001feffa0 8e 01 37 00 68 d6 16 00 - 00 00 00 00 34 00 1a 00 ..7.h.......4...
0000000001feffb0 18 51 19 00 ec ff fe 01 - 83 b6 80 7c f8 d5 19 00 .Q.........|....
0000000001feffc0 8c e4 12 00 b4 e5 12 00 - 10 09 19 00 00 a0 fd 7f ................
0000000001feffd0 00 e6 7b 86 c0 ff fe 01 - a0 66 38 86 ff ff ff ff ..{......f8.....
0000000001feffe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000001fefff0 00 00 00 00 37 3a a5 00 - 10 09 19 00 00 00 00 00 ....7:..........
0000000001ff0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ff0080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xef4 <----*
eax=77e76bf0 ebx=00000000 ecx=00000000 edx=00000000 esi=00168dd8 edi=00000100
eip=7c90eb94 esp=0214fe1c ebp=0214ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0214ff80 77e76c22 0214ffa8 77e76a3b 00168dd8 ntdll!KiFastSystemCallRet
0214ff88 77e76a3b 00168dd8 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
0214ffa8 77e76c0a 0014d528 0214ffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
0214ffb4 7c80b683 001964f8 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
0214ffec 00000000 77e76bf0 001964f8 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000214fe1c 99 e3 90 7c 03 67 e7 77 - d0 02 00 00 70 ff 14 02 ...|.g.w....p...
000000000214fe2c 00 00 00 00 50 35 18 00 - 54 ff 14 02 30 7b 6c f0 ....P5..T...0{l.
000000000214fe3c 01 00 00 00 38 7b 6c f0 - 00 00 00 00 05 c6 4d 80 ....8{l.......M.
000000000214fe4c 88 13 0b 86 02 13 0b 86 - 00 00 7c 86 00 00 00 00 ..........|.....
000000000214fe5c fc 4f 7c 86 00 13 0b 86 - cc 7b 6c f0 82 c2 56 80 .O|......{l...V.
000000000214fe6c 01 00 00 00 70 4e 7c 86 - 00 fc e0 ff 00 00 00 00 ....pN|.........
000000000214fe7c 9e ea 56 80 c8 75 dd 84 - 50 43 32 e1 00 00 00 00 ..V..u..PC2.....
000000000214fe8c e1 04 00 00 9c 7b 6c f0 - ec eb 56 80 50 43 32 e1 .....{l...V.PC2.
000000000214fe9c f0 02 00 00 78 8e d7 85 - 50 43 32 e1 f8 1b 7c 86 ....x...PC2...|.
000000000214feac a0 13 0b 86 03 00 00 00 - 50 43 32 e1 c4 7b 6c f0 ........PC2..{l.
000000000214febc ec eb 56 80 50 43 32 e1 - f8 02 00 00 ff 03 1f 00 ..V.PC2.........
000000000214fecc 50 43 32 e1 50 43 32 e1 - f8 02 00 00 00 00 00 00 PC2.PC2.........
000000000214fedc f0 25 0f e1 e0 7b 6c f0 - dc ec 56 80 50 43 32 e1 .%...{l...V.PC2.
000000000214feec f0 25 0f e1 ff 03 1f 00 - 70 4e 7c 86 50 43 32 e1 .%......pN|.PC2.
000000000214fefc 00 00 00 00 4e 8f 57 80 - d4 7c 6c f0 e4 8e 57 80 ....N.W..|l...W.
000000000214ff0c c8 75 dd 84 00 00 00 00 - 64 7d 6c f0 38 f5 ab f7 .u......d}l.8...
000000000214ff1c 66 c7 4d 80 00 5d e4 84 - 2f c5 4d 80 14 5f e4 84 f.M..]../.M.._..
000000000214ff2c a8 5d e4 84 80 ff 14 02 - 99 66 e7 77 4c ff 14 02 .].......f.wL...
000000000214ff3c a9 66 e7 77 ed 10 90 7c - 10 5e 19 00 f8 64 19 00 .f.w...|.^...d..
000000000214ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0xc10 <----*
eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=02f3fcec ebp=02f3ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
02f3ffb4 7c80b683 00000000 00140000 00000000 ntdll!KiFastSystemCallRet
02f3ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000002f3fcec ab e9 90 7c d5 a0 92 7c - 14 00 00 00 30 fd f3 02 ...|...|....0...
0000000002f3fcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 14 00 ................
0000000002f3fd0c 00 00 00 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c ...........|...|
0000000002f3fd1c 30 05 00 00 10 0c 00 00 - 14 00 00 00 14 00 00 00 0...............
0000000002f3fd2c 13 00 00 00 2c 05 00 00 - 60 03 00 00 7c 05 00 00 ....,...`...|...
0000000002f3fd3c a4 05 00 00 00 06 00 00 - 2c 06 00 00 4c 06 00 00 ........,...L...
0000000002f3fd4c 44 06 00 00 6c 05 00 00 - 98 05 00 00 b0 05 00 00 D...l...........
0000000002f3fd5c d0 05 00 00 d8 05 00 00 - e0 05 00 00 ec 05 00 00 ................
0000000002f3fd6c f4 05 00 00 0c 06 00 00 - 18 06 00 00 20 06 00 00 ............ ...
0000000002f3fd7c 38 06 00 00 84 09 00 00 - 54 0e 00 00 3c 07 00 00 8.......T...<...
0000000002f3fd8c 2c 0e 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ,...............
0000000002f3fd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002f3fe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x998 <----*
eax=769c8831 ebx=0303fef4 ecx=02c1db0c edx=02c1ddc0 esi=00000000 edi=7ffd6000
eip=7c90eb94 esp=0303fecc ebp=0303ff68 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\userenv.dll -
ChildEBP RetAddr Args to Child
0303ff68 7c80a075 00000003 76a60310 00000000 ntdll!KiFastSystemCallRet
0303ff84 769c888d 00000003 76a60310 00000000 kernel32!WaitForMultipleObjects+0x18
0303ffb4 7c80b683 00000000 00000000 00000000 userenv!UnregisterGPNotification+0x15c
0303ffec 00000000 769c8831 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000303fecc ab e9 90 7c e2 94 80 7c - 03 00 00 00 f4 fe 03 03 ...|...|........
000000000303fedc 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000303feec b8 03 a6 76 47 9b 80 7c - 80 05 00 00 84 05 00 00 ...vG..|........
000000000303fefc 88 05 00 00 5c fe 03 03 - 6c ff 03 03 6c ff 03 03 ....\...l...l...
000000000303ff0c 18 ee 90 7c 70 05 91 7c - 14 00 00 00 01 00 00 00 ...|p..|........
000000000303ff1c 00 00 00 00 00 00 00 00 - 10 00 00 00 f6 1b 80 7c ...............|
000000000303ff2c 00 00 00 00 00 00 00 00 - 00 60 fd 7f 00 40 fd 7f .........`...@..
000000000303ff3c 58 3a 14 00 00 00 00 00 - f4 fe 03 03 00 00 00 00 X:..............
000000000303ff4c 03 00 00 00 e8 fe 03 03 - 00 00 00 00 dc ff 03 03 ................
000000000303ff5c a8 9a 83 7c d8 95 80 7c - 00 00 00 00 84 ff 03 03 ...|...|........
000000000303ff6c 75 a0 80 7c 03 00 00 00 - 10 03 a6 76 00 00 00 00 u..|.......v....
000000000303ff7c ff ff ff ff 00 00 00 00 - b4 ff 03 03 8d 88 9c 76 ...............v
000000000303ff8c 03 00 00 00 10 03 a6 76 - 00 00 00 00 ff ff ff ff .......v........
000000000303ff9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 9c 76 ...............v
000000000303ffac 03 00 00 00 00 00 00 00 - ec ff 03 03 83 b6 80 7c ...............|
000000000303ffbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000303ffcc 00 40 fd 7f 00 c6 7b 86 - c0 ff 03 03 30 12 0a 86 .@....{.....0...
000000000303ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
000000000303ffec 00 00 00 00 00 00 00 00 - 31 88 9c 76 00 00 00 00 ........1..v....
000000000303fffc 00 00 00 00 ff ff ff ff - ff ff ff ff 00 00 00 00 ................
*----> State Dump for Thread Id 0x738 <----*
eax=2758242d ebx=0392fb98 ecx=02d20178 edx=01000000 esi=00000000 edi=7ffd6000
eip=7c90eb94 esp=0392fb70 ebp=0392fc0c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Common Files\Microsoft Shared\Windows Live\msidcrl40.dll -
ChildEBP RetAddr Args to Child
0392fc0c 7c80a075 00000003 0392fe4c 00000000 ntdll!KiFastSystemCallRet
0392fc28 2757cb49 00000003 0392fe4c 00000000 kernel32!WaitForMultipleObjects+0x18
0392ff4c 2757cd78 32e5f707 00000050 03060218 msidcrl40!SetUserExtendedProperty+0x36039
0392ff74 27582407 02d24078 32e5f7df 00000050 msidcrl40!SetUserExtendedProperty+0x36268
0392ffac 275824ac 03060218 7c80b683 02d240e0 msidcrl40!SetUserExtendedProperty+0x3b8f7
0392ffec 00000000 2758242d 02d240e0 00000000 msidcrl40!SetUserExtendedProperty+0x3b99c
*----> Raw Stack Dump <----*
000000000392fb70 ab e9 90 7c e2 94 80 7c - 03 00 00 00 98 fb 92 03 ...|...|........
000000000392fb80 01 00 00 00 00 00 00 00 - 00 00 00 00 03 00 00 00 ................
000000000392fb90 78 40 d2 02 e0 40 d2 02 - a4 06 00 00 a8 06 00 00 x@...@..........
000000000392fba0 9c 06 00 00 00 00 00 00 - 94 fb 92 03 18 ee 90 7c ...............|
000000000392fbb0 94 fc 92 03 77 90 9a 74 - 14 00 00 00 01 00 00 00 ....w..t........
000000000392fbc0 00 00 00 00 00 00 00 00 - 10 00 00 00 8d c5 99 74 ...............t
000000000392fbd0 02 00 00 00 f4 fb 92 03 - 00 60 fd 7f 00 f0 fa 7f .........`......
000000000392fbe0 c0 55 24 00 00 00 00 00 - 98 fb 92 03 01 00 00 00 .U$.............
000000000392fbf0 03 00 00 00 8c fb 92 03 - af c7 99 74 68 ff 92 03 ...........th...
000000000392fc00 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 28 fc 92 03 ...|...|....(...
000000000392fc10 75 a0 80 7c 03 00 00 00 - 4c fe 92 03 00 00 00 00 u..|....L.......
000000000392fc20 ff ff ff ff 00 00 00 00 - 4c ff 92 03 49 cb 57 27 ........L...I.W'
000000000392fc30 03 00 00 00 4c fe 92 03 - 00 00 00 00 ff ff ff ff ....L...........
000000000392fc40 50 00 00 00 18 02 06 03 - e0 40 d2 02 00 00 00 00 P........@......
000000000392fc50 00 00 00 00 00 00 00 00 - 00 00 00 00 c8 c9 5b 27 ..............['
000000000392fc60 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000392fc70 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000392fc80 00 60 fd 7f 00 00 00 00 - a4 1e 24 00 00 00 00 00 .`........$.....
000000000392fc90 00 00 00 00 00 00 00 00 - 18 ee 90 7c 00 00 00 00 ...........|....
000000000392fca0 ff ff ff ff 00 00 00 00 - c4 e8 90 7c 00 00 00 00 ...........|....
*----> State Dump for Thread Id 0x4dc <----*
eax=2758242d ebx=03a2fb98 ecx=77eda66e edx=00000000 esi=00000000 edi=7ffd6000
eip=7c90eb94 esp=03a2fb70 ebp=03a2fc0c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
03a2fc0c 7c80a075 00000003 03a2fe4c 00000000 ntdll!KiFastSystemCallRet
03a2fc28 2757cb49 00000003 03a2fe4c 00000000 kernel32!WaitForMultipleObjects+0x18
03a2ff4c 2757cd78 32d5f707 00000000 001402d8 msidcrl40!SetUserExtendedProperty+0x36039
03a2ff74 27582407 02d24560 32d5f7df 00000000 msidcrl40!SetUserExtendedProperty+0x36268
03a2ffac 275824ac 001402d8 7c80b683 02d240e0 msidcrl40!SetUserExtendedProperty+0x3b8f7
03a2ffec 00000000 2758242d 02d240e0 00000000 msidcrl40!SetUserExtendedProperty+0x3b99c
*----> Raw Stack Dump <----*
0000000003a2fb70 ab e9 90 7c e2 94 80 7c - 03 00 00 00 98 fb a2 03 ...|...|........
0000000003a2fb80 01 00 00 00 00 00 00 00 - 00 00 00 00 03 00 00 00 ................
0000000003a2fb90 60 45 d2 02 e0 40 d2 02 - b8 06 00 00 bc 06 00 00 `E...@..........
0000000003a2fba0 b0 06 00 00 00 00 00 00 - 94 fb a2 03 18 ee 90 7c ...............|
0000000003a2fbb0 94 fc a2 03 77 90 9a 74 - 14 00 00 00 01 00 00 00 ....w..t........
0000000003a2fbc0 00 00 00 00 00 00 00 00 - 10 00 00 00 8d c5 99 74 ...............t
0000000003a2fbd0 02 00 00 00 f4 fb a2 03 - 00 60 fd 7f 00 e0 fa 7f .........`......
0000000003a2fbe0 c0 55 24 00 00 00 00 00 - 98 fb a2 03 01 00 00 00 .U$.............
0000000003a2fbf0 03 00 00 00 8c fb a2 03 - af c7 99 74 68 ff a2 03 ...........th...
0000000003a2fc00 a8 9a 83 7c d8 95 80 7c - 00 00 00 00 28 fc a2 03 ...|...|....(...
0000000003a2fc10 75 a0 80 7c 03 00 00 00 - 4c fe a2 03 00 00 00 00 u..|....L.......
0000000003a2fc20 ff ff ff ff 00 00 00 00 - 4c ff a2 03 49 cb 57 27 ........L...I.W'
0000000003a2fc30 03 00 00 00 4c fe a2 03 - 00 00 00 00 ff ff ff ff ....L...........
0000000003a2fc40 00 00 00 00 d8 02 14 00 - e0 40 d2 02 00 00 00 00 .........@......
0000000003a2fc50 00 00 00 00 00 00 00 00 - 00 00 00 00 a0 ba 5b 27 ..............['
0000000003a2fc60 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003a2fc70 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003a2fc80 00 60 fd 7f 00 00 00 00 - a4 1e 24 00 00 00 00 00 .`........$.....
0000000003a2fc90 00 00 00 00 00 00 00 00 - 18 ee 90 7c 00 00 00 00 ...........|....
0000000003a2fca0 ff ff ff ff 00 00 00 00 - c4 e8 90 7c 00 00 00 00 ...........|....
*----> State Dump for Thread Id 0x2ac <----*
eax=00000000 ebx=7c90e9b4 ecx=03b9fad4 edx=7c90eb94 esi=00000000 edi=00000001
eip=7c90eb94 esp=03b9fad4 ebp=03b9fb10 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\mswsock.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ws2_32.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WININET.dll -
ChildEBP RetAddr Args to Child
03b9fb10 71a55fa7 000006d4 000006f8 00000001 ntdll!KiFastSystemCallRet
03b9fc04 71ab2e67 00000001 03b9fe84 03b9fc7c mswsock+0x5fa7
03b9fc54 771d9346 00000001 03b9fe84 03b9fc7c ws2_32!select+0xa7
03b9ffac 771caccc 03b9ffec 7c80b683 030667c8 WININET!DetectAutoProxyUrl+0x5b9
03b9ffb4 7c80b683 030667c8 01fecca4 00140000 WININET!InternetOpenA+0x5ef
03b9ffec 00000000 771cacbf 030667c8 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000003b9fad4 c0 e9 90 7c a5 3c a5 71 - d4 06 00 00 01 00 00 00 ...|.<.q........
0000000003b9fae4 fc fa b9 03 b4 fb b9 03 - 84 fe b9 03 a4 fb b9 03 ................
0000000003b9faf4 d4 06 00 00 ef d8 90 7c - c0 b4 b3 ff ff ff ff ff .......|........
0000000003b9fb04 b0 02 06 03 00 00 00 00 - 00 00 00 00 04 fc b9 03 ................
0000000003b9fb14 a7 5f a5 71 d4 06 00 00 - f8 06 00 00 01 00 00 00 ._.q............
0000000003b9fb24 04 00 00 00 80 fd b9 03 - 40 61 b9 01 7c fc b9 03 ........@a..|...
0000000003b9fb34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003b9fb44 01 00 00 00 80 0f 05 fd - ff ff ff ff dc fb b9 03 ................
0000000003b9fb54 01 00 00 00 00 00 00 00 - a0 00 00 00 00 00 00 00 ................
0000000003b9fb64 00 00 00 00 03 01 00 00 - 00 00 00 00 d4 06 00 00 ................
0000000003b9fb74 38 fc b9 03 00 00 00 00 - 00 00 00 00 1c 00 00 00 8...............
0000000003b9fb84 b0 02 06 03 c0 fb b9 03 - 7c fc b9 03 80 fd b9 03 ........|.......
0000000003b9fb94 00 00 00 00 a4 fb b9 03 - 00 00 00 00 00 00 00 00 ................
0000000003b9fba4 80 0f 05 fd ff ff ff ff - 01 00 00 00 00 fb b9 03 ................
0000000003b9fbb4 f8 06 00 00 19 00 00 00 - 00 fc b9 03 32 2b ab 71 ............2+.q
0000000003b9fbc4 e8 71 b9 01 ec fb b9 03 - 17 62 ab 71 33 27 00 00 .q.......b.q3'..
0000000003b9fbd4 68 df a6 08 01 00 00 00 - 01 00 00 00 1f fc b9 03 h...............
0000000003b9fbe4 58 60 b9 01 9e 08 00 00 - 28 fb b9 03 0c 15 aa 71 X`......(......q
0000000003b9fbf4 44 fc b9 03 c8 71 a7 71 - 68 2e a5 71 ff ff ff ff D....q.qh..q....
0000000003b9fc04 54 fc b9 03 67 2e ab 71 - 01 00 00 00 84 fe b9 03 T...g..q........
*----> State Dump for Thread Id 0x4fc <----*
eax=000000c0 ebx=00000000 ecx=7c800000 edx=00000000 esi=01fec300 edi=02080000
eip=7c90eb94 esp=03cdff9c ebp=03cdffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
03cdffb4 7c80b683 00000000 02080000 01fec300 ntdll!KiFastSystemCallRet
03cdffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000003cdff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff cd 03 \..|.y.|........
0000000003cdffac 00 00 00 00 00 00 00 80 - ec ff cd 03 83 b6 80 7c ...............|
0000000003cdffbc 00 00 00 00 00 00 08 02 - 00 c3 fe 01 00 00 00 00 ................
0000000003cdffcc 00 c0 fa 7f 00 e6 7b 86 - c0 ff cd 03 28 9a f2 85 ......{.....(...
0000000003cdffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
0000000003cdffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
0000000003cdfffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce00ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce00bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ce00cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xa60 <----*
eax=0892fab8 ebx=c0000000 ecx=00000020 edx=00000000 esi=00000000 edi=71a87558
eip=7c90eb94 esp=03f1ff7c ebp=03f1ffb4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
03f1ffb4 7c80b683 71a5d8ec 03ddf67c 7c90ee18 ntdll!KiFastSystemCallRet
03f1ffec 00000000 71a5d5af 001c2738 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000003f1ff7c 1b e3 90 7c 09 d6 a5 71 - b8 07 00 00 bc ff f1 03 ...|...q........
0000000003f1ff8c b0 ff f1 03 a4 ff f1 03 - 50 d6 a5 71 7c f6 dd 03 ........P..q|...
0000000003f1ff9c 18 ee 90 7c 38 27 1c 00 - 00 00 00 00 00 00 00 00 ...|8'..........
0000000003f1ffac 00 00 a5 71 d0 27 ba 03 - ec ff f1 03 83 b6 80 7c ...q.'.........|
0000000003f1ffbc ec d8 a5 71 7c f6 dd 03 - 18 ee 90 7c 38 27 1c 00 ...q|......|8'..
0000000003f1ffcc 00 80 fd 7f 00 c6 7b 86 - c0 ff f1 03 00 56 b9 84 ......{......V..
0000000003f1ffdc ff ff ff ff a8 9a 83 7c - 90 b6 80 7c 00 00 00 00 .......|...|....
0000000003f1ffec 00 00 00 00 00 00 00 00 - af d5 a5 71 38 27 1c 00 ...........q8'..
0000000003f1fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f2009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003f200ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x394 <----*
eax=00001687 ebx=00000000 ecx=0625b598 edx=0441fe30 esi=0000091c edi=00000000
eip=7c90eb94 esp=0441ff10 ebp=0441ff74 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\mshtml.dll -
ChildEBP RetAddr Args to Child
0441ff74 7c802532 0000091c 000927c0 00000000 ntdll!KiFastSystemCallRet
0441ff88 7e8c452f 0000091c 000927c0 7e830000 kernel32!WaitForSingleObject+0x12
0441ffb4 7c80b683 04035920 ffffffff 7c9106eb mshtml!DllGetClassObject+0x79744
0441ffec 00000000 7e84a6fa 04035920 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000441ff10 c0 e9 90 7c cb 25 80 7c - 1c 09 00 00 00 00 00 00 ...|.%.|........
000000000441ff20 44 ff 41 04 00 00 00 00 - 20 59 03 04 00 00 00 00 D.A..... Y......
000000000441ff30 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000441ff40 10 00 00 00 00 44 5f 9a - fe ff ff ff 00 60 fd 7f .....D_......`..
000000000441ff50 00 90 fa 7f 44 ff 41 04 - 00 00 00 00 24 ff 41 04 ....D.A.....$.A.
000000000441ff60 90 99 85 7e dc ff 41 04 - a8 9a 83 7c f8 25 80 7c ...~..A....|.%.|
000000000441ff70 00 00 00 00 88 ff 41 04 - 32 25 80 7c 1c 09 00 00 ......A.2%.|....
000000000441ff80 c0 27 09 00 00 00 00 00 -
#2
The quick answer is whip off IE7 and use Firefox You can get firefox by clicking here
Access violations come from two programs trying to use the same memory address at the same time, but in this case it actually looks like some important IE7 files have been overwritten with an older version that doesn't contain code that IE7 is expecting to find.
Try re-installing IE7, or remove it completely, then re-install it.
Access violations come from two programs trying to use the same memory address at the same time, but in this case it actually looks like some important IE7 files have been overwritten with an older version that doesn't contain code that IE7 is expecting to find.
Try re-installing IE7, or remove it completely, then re-install it.
#4
Thread Starter
Super Moderator
iTrader: (2)
Joined: Jun 2003
Posts: 18,598
Likes: 4
From: somwhere in wow
cheers all
have got bored with uninstalling it and reinstalling it did it 4 times the other nigh.. even resorted to complete wipe and start from scratch...
was running fine... then upgraded to ie7 and it all went tits up after the 89 updates it needed
seriously though ... have done all the updates before i did the ie7 but it makes no real difference still goes tits up... i loose the tabbed browsing then it just decides to reset itself and reboot
might have to try vista now just for a giggle
have got bored with uninstalling it and reinstalling it did it 4 times the other nigh.. even resorted to complete wipe and start from scratch...
was running fine... then upgraded to ie7 and it all went tits up after the 89 updates it needed
seriously though ... have done all the updates before i did the ie7 but it makes no real difference still goes tits up... i loose the tabbed browsing then it just decides to reset itself and reboot
might have to try vista now just for a giggle
#5
I've just read something about this problem, which seems to affect IE7 Beta 3 users, or those that have installed Office 2007.
Take a look here: http://www.jcxp.net/forums/index.php?showtopic=8757 or download firefox
Take a look here: http://www.jcxp.net/forums/index.php?showtopic=8757 or download firefox
#7
Thread Starter
Super Moderator
iTrader: (2)
Joined: Jun 2003
Posts: 18,598
Likes: 4
From: somwhere in wow
Originally Posted by cozmeister
I've just read something about this problem, which seems to affect IE7 Beta 3 users, or those that have installed Office 2007.
Take a look here: http://www.jcxp.net/forums/index.php?showtopic=8757 or download firefox
Take a look here: http://www.jcxp.net/forums/index.php?showtopic=8757 or download firefox
have had enough of it now tho and wiped it so will start agian and install office xp
although now have a virus on this pc that i am having trouble shifting i hate pc's
Trending Topics
#8
Originally Posted by The Jaycos
Originally Posted by cozmeister
I've just read something about this problem, which seems to affect IE7 Beta 3 users, or those that have installed Office 2007.
Take a look here: http://www.jcxp.net/forums/index.php?showtopic=8757 or download firefox
Take a look here: http://www.jcxp.net/forums/index.php?showtopic=8757 or download firefox
have had enough of it now tho and wiped it so will start agian and install office xp
although now have a virus on this pc that i am having trouble shifting i hate pc's
Thread
Thread Starter
Forum
Replies
Last Post
DixieTheKid
Ford Sierra/Sapphire/RS500 Cosworth
11
06-06-2020 12:20 PM
nico12
Restorations, Rebuilds & Projects.
6
31-12-2015 05:42 PM