MTM2.com

A forum for mtm2 discussion
FAQ :: Search :: Members :: Groups :: Register
Login
It is currently Mon Nov 25, 2024 9:44 am



Post new topic Reply to topic  [ 35 posts ]  Go to page Previous  1, 2   
Author Message
 Post subject:
PostPosted: Sat Mar 11, 2006 8:16 pm 
Member

Joined: Wed Nov 01, 2000 2:01 pm
Posts: 96
Location: Minneapolis KS
When you get that error have you clicked on "To see what data this error report contains click here" Clicking on it will give you a detailed report of what went wrong. It will be pretty technical but if you post it here we might be able to figure it out.


Quote:
nd the Repair windows function is a no go.. since they've patched everything under the sun, the cd's files are too old for anything to work.


What makes you say this, it is true you will have to run Windows update if you do a repair install of Windows to get it back up to date but it is still much faster than installing the OS and all your programs from scratch. I had to do this just a week ago when I had to replace my motherboard.

_________________
Reality is for those that cant handle video games.


Top
 Profile  
 
 Post subject:
PostPosted: Sat Mar 11, 2006 8:46 pm 
Glow Ball
User avatar

Joined: Tue Feb 02, 1999 7:00 pm
Posts: 23
Yes, that's like back dating drivers. It can work. Which reminds me, have you thought to roll back to a previous restore point?


Top
 Profile  
 
 Post subject:
PostPosted: Sat Mar 11, 2006 10:33 pm 
Member
User avatar

Joined: Sat May 11, 2002 2:01 pm
Posts: 247
Location: surrey, bc, canada
hey psyco, take a look at this page. it may help u.
http://www.neowin.net/forum/index.php?showtopic=235571

_________________
Leg's Auto Emporium most anything that you'll need to make a truck!


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 6:07 am 
Member
User avatar

Joined: Wed Mar 01, 2000 2:01 pm
Posts: 747
Location: Salem, OR, USA
Psyco, Try uninstalling WallMaster (the screensaver proggy I recommended).
After uninstalling via the Control Panel run Adaware http://www.lavasoft.de/software/adaware/ AND Spybot http://www.download.com/3000-2144-10122137.html.
(Spybot finds things that Adaware and Norton don't pick up and vice versa).
See if that fixes your problems.

I should have warned you that I had issues after installing Wallmaster but thought it was just my setup. I think the program automatically runs at startup (plus the services/plugins that come with it, depending on what options you choose on installation, Plus "agreeing to the terms" installs software that you have no choice but to install to make the program work). In other words it seems to take over your system/browser.

In a way I hope Wallmaster is not the problem because I recommended it :( but on the other hand I hope it is the problem so you can get your system fixed.

Good Luck.


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 9:54 am 
Member

Joined: Sat Feb 26, 2000 2:01 pm
Posts: 621
Location: Mississippi , USA
Woody... How can I post it? The window won't let me copy and paste. The Little text file that it creates in the temp directory doesn't include the same information, it looks like it's kust to verify my copy of windows is legal...


Phin.. I thought about it, but I've never used the restore points before.. does everything go back to where I restore or just windows?


Emcee.. I considered that when this started happening.. but this didn't happen the first few days with the regular wallmaster.. it started a couple days after I had upgraded to wallmaster PRO.. which has been uninstalled.. Didn't change anything.

_________________
<p><font color="#990000">"I regret not what I've done, but what I didn't do."</font></p>
<p><a href="http://brandonbatson.com"><font color="#000066"><b><font color="#006666">http://brandonbatson.com
</font></b></font></a> </p>


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 10:46 am 
Member

Joined: Sat Feb 26, 2000 2:01 pm
Posts: 621
Location: Mississippi , USA
Here's what dr> Watson pulled out


Quote:

Application exception occurred:
App: F:\Program Files\Internet Explorer\IEXPLORE.EXE (pid=3060)
When: 3/10/2006 @ 17:31:48.953
Exception number: c0000005 (access violation)

*----> System Information <----*
User Name: Brandon
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 6 Model 10 Stepping 0
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free

*----> Task List <----*
0 System Process
4 System
704 smss.exe
752 csrss.exe
780 winlogon.exe
824 services.exe
836 lsass.exe
992 svchost.exe
1072 svchost.exe
1220 MsMpEng.exe
1268 svchost.exe
1336 svchost.exe
1460 svchost.exe
1536 spoolsv.exe
1716 aswUpdSv.exe
1732 ashServ.exe
1764 BTNtService.exe
1780 DkService.exe
1860 nvsvc32.exe
1892 wdfmgr.exe
312 ashWebSv.exe
424 Explorer.EXE
260 NVMixerTray.exe
612 jusched.exe
228 iTunesHelper.exe
1436 swtrayv4.exe
2060 iPodService.exe
2156 point32.exe
2172 MSASCui.exe
2180 ashDisp.exe
2476 svchost.exe
3060 IEXPLORE.EXE
3856 Paint Shop Pro 9.exe
2744 svchost.exe
3652 Azureus.exe
3668 javaw.exe
3656 drwtsn32.exe

*----> Module List <----*
(0000000000400000 - 0000000000419000: F:\Program Files\Internet Explorer\IEXPLORE.EXE
(0000000001020000 - 00000000010a8000: F:\WINDOWS\system32\shdoclc.dll
(00000000010b0000 - 0000000001375000: F:\WINDOWS\system32\xpsp2res.dll
(0000000001e20000 - 0000000001e47000: F:\WINDOWS\system32\msls31.dll
(0000000010000000 - 000000001000e000: F:\Program Files\Adobe\Acrobat 7.0\ActiveX\AcroIEHelper.dll
(0000000020000000 - 0000000020012000: F:\WINDOWS\system32\browselc.dll
(000000004d4f0000 - 000000004d548000: F:\WINDOWS\system32\WINHTTP.dll
(000000005ad70000 - 000000005ada8000: F:\WINDOWS\system32\uxtheme.dll
(000000005b860000 - 000000005b8b4000: F:\WINDOWS\system32\NETAPI32.dll
(000000005d090000 - 000000005d127000: F:\WINDOWS\system32\comctl32.dll
(000000005edd0000 - 000000005ede7000: F:\WINDOWS\system32\OLEPRO32.DLL
(000000005ff20000 - 000000005ff46000: F:\WINDOWS\system32\MSRATING.dll
(000000005ff50000 - 000000005ff61000: F:\WINDOWS\system32\msratelc.dll
(00000000662b0000 - 0000000066308000: F:\WINDOWS\system32\hnetcfg.dll
(000000006bdd0000 - 000000006be06000: F:\WINDOWS\system32\dxtrans.dll
(000000006be10000 - 000000006be6a000: F:\WINDOWS\system32\dxtmsft.dll
(000000006d430000 - 000000006d43a000: F:\WINDOWS\system32\ddrawex.dll
(000000006d600000 - 000000006d62d000: F:\Program Files\Java\jre1.5.0_06\bin\ssv.dll
(0000000071a50000 - 0000000071a8f000: F:\WINDOWS\system32\mswsock.dll
(0000000071a90000 - 0000000071a98000: F:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: F:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: F:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: F:\WINDOWS\system32\wsock32.dll
(0000000071d40000 - 0000000071d5c000: F:\WINDOWS\system32\actxprxy.dll
(00000000722b0000 - 00000000722b5000: F:\WINDOWS\system32\sensapi.dll
(0000000072d10000 - 0000000072d18000: F:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: F:\WINDOWS\system32\wdmaud.drv
(0000000073300000 - 0000000073367000: F:\WINDOWS\system32\vbscript.dll
(0000000073760000 - 00000000737a9000: F:\WINDOWS\system32\DDRAW.dll
(0000000073bc0000 - 0000000073bc6000: F:\WINDOWS\system32\DCIMAN32.dll
(0000000073dd0000 - 0000000073ece000: F:\WINDOWS\system32\MFC42.DLL
(00000000745e0000 - 00000000748a6000: F:\WINDOWS\system32\msi.dll
(0000000074980000 - 0000000074ab0000: F:\WINDOWS\system32\msxml3.dll
(0000000074d90000 - 0000000074dfb000: F:\WINDOWS\system32\USP10.dll
(00000000754d0000 - 0000000075550000: F:\WINDOWS\system32\CRYPTUI.dll
(0000000075c50000 - 0000000075cbe000: F:\WINDOWS\system32\jscript.dll
(0000000075cf0000 - 0000000075d81000: F:\WINDOWS\system32\mlang.dll
(0000000075e90000 - 0000000075f40000: F:\WINDOWS\system32\SXS.DLL
(0000000075f80000 - 000000007607d000: F:\WINDOWS\system32\BROWSEUI.dll
(0000000076200000 - 0000000076271000: F:\WINDOWS\system32\mshtmled.dll
(0000000076390000 - 00000000763ad000: F:\WINDOWS\system32\IMM32.DLL
(00000000769c0000 - 0000000076a73000: F:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: F:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: F:\WINDOWS\system32\WINMM.dll
(0000000076c30000 - 0000000076c5e000: F:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: F:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: F:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: F:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: F:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: F:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: F:\WINDOWS\system32\RASAPI32.DLL
(0000000076f20000 - 0000000076f47000: F:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: F:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: F:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: F:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: F:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: F:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: F:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: F:\WINDOWS\system32\WININET.dll
(0000000077260000 - 00000000772ff000: F:\WINDOWS\system32\urlmon.dll
(00000000773d0000 - 00000000774d2000: F:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll
(00000000774e0000 - 000000007761d000: F:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778ce000: F:\WINDOWS\system32\SHDOCVW.dll
(0000000077920000 - 0000000077a13000: F:\WINDOWS\system32\SETUPAPI.dll
(0000000077a80000 - 0000000077b14000: F:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: F:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: F:\WINDOWS\system32\appHelp.dll
(0000000077bd0000 - 0000000077bd7000: F:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: F:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: F:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: F:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: F:\WINDOWS\system32\msv1_0.dll
(0000000077d40000 - 0000000077dd0000: F:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: F:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: F:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: F:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: F:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: F:\WINDOWS\system32\Secur32.dll
(000000007c340000 - 000000007c396000: F:\WINDOWS\system32\MSVCR71.dll
(000000007c800000 - 000000007c8f4000: F:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: F:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: F:\WINDOWS\system32\SHELL32.dll
(000000007d4a0000 - 000000007d787000: F:\WINDOWS\system32\mshtml.dll

*----> State Dump for Thread Id 0x7d0 <----*

eax=00000000 ebx=00000000 ecx=001e8008 edx=00000000 esi=00171f50 edi=00000000
eip=7c90eb94 esp=0013eb7c ebp=0013edd8 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\BROWSEUI.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\SHDOCVW.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\Program Files\Internet Explorer\IEXPLORE.EXE -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0013edd8 75faeab5 00171ce0 0013ee98 00171ce0 ntdll!KiFastSystemCallRet
0013ee6c 75faed7d 00171ce0 00171ce0 00000000 BROWSEUI!Ordinal107+0xbff6
0013fef0 777e80aa 00171ce0 00000000 00000000 BROWSEUI!Ordinal102+0x22c
0013ff10 00402372 001623ba 00000001 00dbcecc SHDOCVW!Ordinal211+0xc0ed
0013ff60 00402444 00400000 00000000 001623ba IEXPLORE+0x2372
0013ffc0 7c816d4f 00dbcecc 7c90e1fe 7ffdc000 IEXPLORE+0x2444
0013fff0 00000000 00402451 00000000 52515350 kernel32!RegisterWaitForInputIdle+0x49

*----> Raw Stack Dump <----*
000000000013eb7c 18 94 d4 77 99 e9 fa 75 - 98 ee 13 00 00 00 00 00 ...w...u........
000000000013eb8c 00 00 00 00 e0 00 0f 00 - 00 04 00 00 be ba 00 00 ................
000000000013eb9c ac 43 e0 02 9e 8f 39 02 - f6 03 00 00 04 00 00 00 .C....9.........
000000000013ebac 01 00 00 00 01 44 00 90 - 50 1f 17 00 00 00 00 00 .....D..P.......
000000000013ebbc ae 00 21 00 c0 cf 16 00 - 01 00 00 00 00 00 00 00 ..!.............
000000000013ebcc 4d 00 69 00 63 00 72 00 - 6f 00 73 00 6f 00 66 00 M.i.c.r.o.s.o.f.
000000000013ebdc 74 00 20 00 49 00 6e 00 - 74 00 65 00 72 00 6e 00 t. .I.n.t.e.r.n.
000000000013ebec 65 00 74 00 20 00 45 00 - 78 00 70 00 6c 00 6f 00 e.t. .E.x.p.l.o.
000000000013ebfc 72 00 65 00 72 00 00 00 - 37 42 2d 31 00 00 00 00 r.e.r...7B-1....
000000000013ec0c 39 44 31 46 2d 30 30 30 - 38 29 17 00 35 43 41 35 9D1F-0008)..5CA5
000000000013ec1c 37 7d 00 00 70 1e 17 00 - dd 43 f6 77 48 53 9c 7c 7}..p....C.wHS.|
000000000013ec2c 04 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
000000000013ec3c 28 01 00 00 08 00 00 00 - 78 01 16 00 c0 e4 97 7c (.......x......|
000000000013ec4c 20 23 17 00 f8 35 88 7c - 78 1e 17 00 59 48 91 7c #...5.|x...YH.|
000000000013ec5c 0f 00 00 00 78 01 16 00 - 38 05 16 00 40 29 17 00 ....x...8...@)..
000000000013ec6c 38 0f 14 00 68 05 16 00 - 4e f4 00 00 78 01 16 00 8...h...N...x...
000000000013ec7c b9 43 f6 77 c0 ed 13 00 - d0 43 f6 77 98 89 9e 7c .C.w.....C.w...|
000000000013ec8c 0f 00 00 00 d0 78 9e 7c - 01 00 00 00 e8 ec 13 00 .....x.|........
000000000013ec9c d3 9b 91 7c 5a ed 13 00 - 35 01 00 00 00 00 9c 7c ...|Z...5......|
000000000013ecac d9 00 00 00 98 89 9e 7c - 00 00 00 00 78 00 00 00 .......|....x...

*----> State Dump for Thread Id 0x168 <----*

eax=0151fc40 ebx=001ac648 ecx=0018eae0 edx=7723973c esi=7fffffff edi=ffffffff
eip=7c90eb94 esp=0151fad0 ebp=0151fb0c iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\mswsock.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\WS2_32.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\WININET.dll -
ChildEBP RetAddr Args to Child
0151fb0c 71a55fa7 00000264 00000270 00000000 ntdll!KiFastSystemCallRet
0151fc00 71ab2e67 00000001 0151fe80 0151fc78 mswsock+0x5fa7
0151fc50 771d714f 00000001 0151fe80 0151fc78 WS2_32!select+0xa7
0151ffac 771d9283 0151ffec 7c80b50b 0018eae0 WININET!GetUrlCacheEntryInfoExW+0x892
0151ffb4 7c80b50b 0018eae0 71ab1404 0000005d WININET!InternetSetStatusCallback+0x1d7
0151ffec 00000000 771d9276 0018eae0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000151fad0 c0 e9 90 7c 33 40 a5 71 - 64 02 00 00 01 00 00 00 ...|3@.qd.......
000000000151fae0 f8 fa 51 01 b0 fb 51 01 - 80 fe 51 01 a0 fb 51 01 ..Q...Q...Q...Q.
000000000151faf0 de 2c 5b b6 9a 44 c6 01 - ff ff ff ff ff ff ff 7f .,[..D..........
000000000151fb00 48 c6 1a 00 00 00 00 00 - 00 00 00 00 00 fc 51 01 H.............Q.
000000000151fb10 a7 5f a5 71 64 02 00 00 - 70 02 00 00 00 00 00 00 ._.qd...p.......
000000000151fb20 04 00 00 00 7c fd 51 01 - 30 c7 1a 00 78 fc 51 01 ....|.Q.0...x.Q.
000000000151fb30 90 fc d2 ff ff ff ff ff - 90 fc d2 ff ff ff ff ff ................
000000000151fb40 01 00 00 00 80 2a 2d 00 - f0 d8 ff ff 10 00 00 00 .....*-.........
000000000151fb50 00 00 00 00 b0 44 a5 71 - 01 00 00 00 30 c7 1a 00 .....D.q....0...
000000000151fb60 00 00 00 00 18 fc 51 01 - 01 00 00 00 00 00 00 00 ......Q.........
000000000151fb70 34 fc 51 01 01 00 00 00 - 00 00 00 00 1c 00 00 00 4.Q.............
000000000151fb80 48 c6 1a 00 bc fb 51 01 - 78 fc 51 01 7c fd 51 01 H.....Q.x.Q.|.Q.
000000000151fb90 00 00 00 00 a0 fb 51 01 - 00 00 00 00 00 00 00 00 ......Q.........
000000000151fba0 10 27 00 00 f0 d8 ff ff - 01 00 00 00 00 71 a7 71 .'...........q.q
000000000151fbb0 70 02 00 00 19 00 00 00 - b0 44 a5 71 79 43 ab 71 p........D.qyC.q
000000000151fbc0 70 02 00 00 18 fc 51 01 - 01 00 00 00 30 fc 51 01 p.....Q.....0.Q.
000000000151fbd0 2c fc 51 01 32 2b ab 71 - 30 c7 1a 00 30 c7 1a 00 ,.Q.2+.q0...0...
000000000151fbe0 82 43 ab 71 15 a1 00 00 - 24 fb 51 01 0c 15 aa 71 .C.q....$.Q....q
000000000151fbf0 40 fc 51 01 c8 71 a7 71 - 68 2e a5 71 ff ff ff ff @.Q..q.qh..q....
000000000151fc00 50 fc 51 01 67 2e ab 71 - 01 00 00 00 80 fe 51 01 P.Q.g..q......Q.

*----> State Dump for Thread Id 0x484 <----*

eax=000000c0 ebx=00000000 ecx=7c800000 edx=00000000 esi=00138b44 edi=02080000
eip=7c90eb94 esp=0161ff9c ebp=0161ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0161ffb4 7c80b50b 00000000 02080000 00138b44 ntdll!KiFastSystemCallRet
0161ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000161ff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff 61 01 \..|.y.|......a.
000000000161ffac 00 00 00 00 00 00 00 80 - ec ff 61 01 0b b5 80 7c ..........a....|
000000000161ffbc 00 00 00 00 00 00 08 02 - 44 8b 13 00 00 00 00 00 ........D.......
000000000161ffcc 00 d0 fd 7f 00 06 7c 86 - c0 ff 61 01 f8 3e 9f 85 ......|...a..>..
000000000161ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
000000000161ffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
000000000161fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000162000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000162001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000162002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000162003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000162004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000162005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000162006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000162007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000162008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000162009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000016200ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000016200bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000016200cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xf80 <----*

eax=00000001 ebx=00000000 ecx=00163384 edx=7c90eb94 esi=001632e0 edi=00163384
eip=7c90eb94 esp=0181fe1c ebp=0181ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0181ff80 77e76c22 0181ffa8 77e76a3b 001632e0 ntdll!KiFastSystemCallRet
0181ff88 77e76a3b 001632e0 00000000 0013d7dc RPCRT4!I_RpcBCacheFree+0x5ea
0181ffa8 77e76c0a 001796d0 0181ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0181ffb4 7c80b50b 0019d238 00000000 0013d7dc RPCRT4!I_RpcBCacheFree+0x5d2
0181ffec 00000000 77e76bf0 0019d238 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000181fe1c 99 e3 90 7c 03 67 e7 77 - 88 02 00 00 70 ff 81 01 ...|.g.w....p...
000000000181fe2c 00 00 00 00 18 77 1c 00 - 4c ff 81 01 30 65 97 85 .....w..L...0e..
000000000181fe3c 00 e0 fd 7f fc 07 30 c0 - 78 ff 1f c0 86 07 00 00 ......0.x.......
000000000181fe4c 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000181fe5c a8 eb 01 b9 04 ec 01 b9 - 8e b5 4e 80 fc 07 30 c0 ..........N...0.
000000000181fe6c 0b 00 00 00 06 b4 4e 80 - 00 e0 fd 7f 00 00 00 00 ......N.........
000000000181fe7c 00 00 00 00 50 42 a6 85 - 38 63 97 85 01 64 97 85 ....PB..8c...d..
000000000181fe8c 00 00 00 00 78 ff 1f c0 - 34 ec 01 b9 01 01 00 00 ....x...4.......
000000000181fe9c e0 ec 01 b9 30 00 00 00 - 38 63 97 85 00 00 00 00 ....0...8c......
000000000181feac 00 00 00 00 bc eb 01 b9 - 00 00 00 00 e5 cc 4d 80 ..............M.
000000000181febc 08 00 00 00 87 02 00 00 - 1c 93 65 80 ff ff ff ff ..........e.....
000000000181fecc 00 e0 fd 7f 00 00 00 00 - 08 9b a8 85 00 00 00 00 ................
000000000181fedc 48 ec 01 b9 df 94 65 80 - d0 eb 01 b9 00 00 00 00 H.....e.........
000000000181feec 00 00 00 00 0c 00 78 00 - 50 e0 7e 86 38 8a aa e1 ......x.P.~.8...
000000000181fefc 02 00 00 00 20 ec 01 b9 - 00 07 7c 86 e0 03 a3 85 .... .....|.....
000000000181ff0c ee bc 4d 80 08 9b a8 85 - 54 cd bb 85 24 ec 01 b9 ..M.....T...$...
000000000181ff1c b2 c2 4d 80 ba c2 4d 80 - 24 cd bb 85 b8 cb bb 85 ..M...M.$.......
000000000181ff2c ec cb bb 85 80 ff 81 01 - 99 66 e7 77 4c ff 81 01 .........f.wL...
000000000181ff3c a9 66 e7 77 ed 10 90 7c - 00 e0 1a 00 38 d2 19 00 .f.w...|....8...
000000000181ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0x7f0 <----*

eax=00190a88 ebx=00007530 ecx=001ae0e0 edx=774e1c41 esi=00000000 edi=0191ff50
eip=7c90eb94 esp=0191ff20 ebp=0191ff78 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr Args to Child
0191ff78 7c802451 0000ea60 00000000 0191ffb4 ntdll!KiFastSystemCallRet
0191ff88 774fe31d 0000ea60 001adfe0 774fe3dc kernel32!Sleep+0xf
0191ffb4 7c80b50b 001adfe0 7c910945 7c91094e ole32!StringFromGUID2+0x51b
0191ffec 00000000 774fe429 001adfe0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000191ff20 5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff 91 01 \..|.#.|....P...
000000000191ff30 50 25 80 7c f8 6d 60 77 - 30 75 00 00 14 00 00 00 P%.|.m`w0u......
000000000191ff40 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
000000000191ff50 00 ba 3c dc ff ff ff ff - bc fe 91 01 50 ff 91 01 ..<.........P...
000000000191ff60 30 ff 91 01 fc fe 91 01 - dc ff 91 01 f3 99 83 7c 0..............|
000000000191ff70 58 24 80 7c 00 00 00 00 - 88 ff 91 01 51 24 80 7c X$.|........Q$.|
000000000191ff80 60 ea 00 00 00 00 00 00 - b4 ff 91 01 1d e3 4f 77 `.............Ow
000000000191ff90 60 ea 00 00 e0 df 1a 00 - dc e3 4f 77 00 00 00 00 `.........Ow....
000000000191ffa0 45 09 91 7c e0 df 1a 00 - 00 00 4e 77 44 e4 4f 77 E..|......NwD.Ow
000000000191ffb0 4e 09 91 7c ec ff 91 01 - 0b b5 80 7c e0 df 1a 00 N..|.......|....
000000000191ffc0 45 09 91 7c 4e 09 91 7c - e0 df 1a 00 00 90 fd 7f E..|N..|........
000000000191ffd0 00 06 7c 86 c0 ff 91 01 - b0 10 a5 85 ff ff ff ff ..|.............
000000000191ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
000000000191fff0 00 00 00 00 29 e4 4f 77 - e0 df 1a 00 00 00 00 00 ....).Ow........
0000000001920000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001920010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001920020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001920030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001920040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001920050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x2f4 <----*

eax=00000000 ebx=00000000 ecx=001b40d8 edx=7c90eb94 esi=001632e0 edi=00163384
eip=7c90eb94 esp=01a1fe1c ebp=01a1ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01a1ff80 77e76c22 01a1ffa8 77e76a3b 001632e0 ntdll!KiFastSystemCallRet
01a1ff88 77e76a3b 001632e0 00000000 01000178 RPCRT4!I_RpcBCacheFree+0x5ea
01a1ffa8 77e76c0a 001796d0 01a1ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
01a1ffb4 7c80b50b 001b40d8 00000000 01000178 RPCRT4!I_RpcBCacheFree+0x5d2
01a1ffec 00000000 77e76bf0 001b40d8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001a1fe1c 99 e3 90 7c 03 67 e7 77 - 88 02 00 00 70 ff a1 01 ...|.g.w....p...
0000000001a1fe2c 00 00 00 00 40 ee 17 00 - 4c ff a1 01 f7 f3 f0 ff ....@...L.......
0000000001a1fe3c f8 f6 f5 ff f9 f9 f9 ff - fa fa fa ff fb fb fb ff ................
0000000001a1fe4c fc fc fc ff 02 fe fe ff - 00 00 ff ff ff f2 e5 ff ................
0000000001a1fe5c ef bd 92 ff a3 ff ff ff - a3 ff ff ff a3 ff ff ff ................
0000000001a1fe6c 0c 00 00 00 d2 fb ff ff - 00 99 cc bf 00 00 00 00 ................
0000000001a1fe7c 00 00 00 00 00 00 00 00 - 99 33 00 20 a9 43 00 ff .........3. .C..
0000000001a1fe8c cc 66 00 ff cc 66 00 ff - 9d 37 00 df 00 00 00 00 .f...f...7......
0000000001a1fe9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001a1feac 00 00 00 00 99 33 00 40 - 9d 37 00 ef ce 68 00 ff .....3.@.7...h..
0000000001a1febc e0 7a 00 ff e5 80 00 ff - b6 50 00 ff 99 33 00 60 .z.......P...3.`
0000000001a1fecc b0 4a 00 ff fb 95 00 ff - ff 99 00 ff 99 33 00 bf .J...........3..
0000000001a1fedc 00 00 00 00 00 00 00 00 - 99 33 00 bf cc 66 00 ff .........3...f..
0000000001a1feec cc 66 00 ff b3 4d 00 ff - 99 33 00 cf b9 53 00 ff .f...M...3...S..
0000000001a1fefc cc 66 00 ff cc 66 00 ff - b9 53 00 ff 99 33 00 cf .f...f...S...3..
0000000001a1ff0c 99 33 00 10 00 00 00 00 - bc 11 9c 85 24 5c 14 ba .3..........$\..
0000000001a1ff1c b2 c2 4d 80 ba c2 4d 80 - 8c 11 9c 85 20 10 9c 85 ..M...M..... ...
0000000001a1ff2c 54 10 9c 85 80 ff a1 01 - 99 66 e7 77 4c ff a1 01 T........f.wL...
0000000001a1ff3c a9 66 e7 77 ed 10 90 7c - e0 49 1b 00 d8 40 1b 00 .f.w...|.I...@..
0000000001a1ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0x3a0 <----*

eax=01b1ff00 ebx=01b1fee0 ecx=01b1feb8 edx=7c90eb94 esi=00000000 edi=7ffdc000
eip=7c90eb94 esp=01b1feb8 ebp=01b1ff54 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01b1ff54 7c809c86 00000002 01b1ffa8 00000000 ntdll!KiFastSystemCallRet
01b1ff70 771b18fe 00000002 01b1ffa8 00000000 kernel32!WaitForMultipleObjects+0x18
01b1ffb0 771cda2d 7c80b50b 001c20c8 7c9106eb WININET+0x18fe
01b1ffec 00000000 771cda22 001c20c8 00000000 WININET!InternetLockRequestFile+0x13d9

*----> Raw Stack Dump <----*
0000000001b1feb8 ab e9 90 7c f2 94 80 7c - 02 00 00 00 e0 fe b1 01 ...|...|........
0000000001b1fec8 01 00 00 00 00 00 00 00 - 14 ff b1 01 eb 06 91 7c ...............|
0000000001b1fed8 c8 20 1c 00 00 20 1c 00 - a8 03 00 00 a4 03 00 00 . ... ..........
0000000001b1fee8 90 90 23 77 a8 90 23 77 - 14 00 00 00 01 00 00 00 ..#w..#w........
0000000001b1fef8 00 00 00 00 00 00 00 00 - 14 00 00 00 01 00 00 00 ................
0000000001b1ff08 00 00 00 00 00 00 00 00 - 10 00 00 00 00 50 97 92 .............P..
0000000001b1ff18 71 e7 ff ff e4 fe b1 01 - 00 c0 fd 7f 00 70 fd 7f q............p..
0000000001b1ff28 f3 99 83 7c 14 ff b1 01 - e0 fe b1 01 00 26 80 7c ...|.........&.|
0000000001b1ff38 02 00 00 00 d4 fe b1 01 - ff ff ff ff dc ff b1 01 ................
0000000001b1ff48 f3 99 83 7c 90 95 80 7c - 00 00 00 00 70 ff b1 01 ...|...|....p...
0000000001b1ff58 86 9c 80 7c 02 00 00 00 - a8 ff b1 01 00 00 00 00 ...|............
0000000001b1ff68 00 bb ee a0 00 00 00 00 - b0 ff b1 01 fe 18 1b 77 ...............w
0000000001b1ff78 02 00 00 00 a8 ff b1 01 - 00 00 00 00 00 bb ee a0 ................
0000000001b1ff88 24 fc 71 01 58 16 1c 00 - 03 01 00 00 00 00 00 00 $.q.X...........
0000000001b1ff98 00 00 00 00 00 00 00 00 - a4 03 00 00 c4 75 2a 02 .............u*.
0000000001b1ffa8 a8 03 00 00 a4 03 00 00 - ec ff b1 01 2d da 1c 77 ............-..w
0000000001b1ffb8 0b b5 80 7c c8 20 1c 00 - eb 06 91 7c 24 fc 71 01 ...|. .....|$.q.
0000000001b1ffc8 c8 20 1c 00 00 70 fd 7f - 00 06 7c 86 c0 ff b1 01 . ...p....|.....
0000000001b1ffd8 b8 ee c5 85 ff ff ff ff - f3 99 83 7c 18 b5 80 7c ...........|...|
0000000001b1ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 22 da 1c 77 ............"..w

*----> State Dump for Thread Id 0xe18 <----*

eax=01c1feb4 ebx=c0000000 ecx=00000010 edx=00000010 esi=00000000 edi=71a87558
eip=7c90eb94 esp=01c1ff7c ebp=01c1ffb4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01c1ffb4 7c80b50b 71a5d8ec 00000000 00000000 ntdll!KiFastSystemCallRet
01c1ffec 00000000 71a5d5af 001bee10 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001c1ff7c 1b e3 90 7c 09 d6 a5 71 - e8 03 00 00 bc ff c1 01 ...|...q........
0000000001c1ff8c b0 ff c1 01 a4 ff c1 01 - 50 d6 a5 71 00 00 00 00 ........P..q....
0000000001c1ff9c 00 00 00 00 10 ee 1b 00 - 00 00 00 00 00 00 00 00 ................
0000000001c1ffac 00 00 a5 71 28 e4 b4 06 - ec ff c1 01 0b b5 80 7c ...q(..........|
0000000001c1ffbc ec d8 a5 71 00 00 00 00 - 00 00 00 00 10 ee 1b 00 ...q............
0000000001c1ffcc 00 60 fd 7f 00 06 7c 86 - c0 ff c1 01 b0 40 9f 85 .`....|......@..
0000000001c1ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
0000000001c1ffec 00 00 00 00 00 00 00 00 - af d5 a5 71 10 ee 1b 00 ...........q....
0000000001c1fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c2000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c2001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c2002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c2003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c2004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c2005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c2006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c2007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c2008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c2009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c200ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x494 <----*

eax=01e46ffd ebx=000003f4 ecx=00002746 edx=00000001 esi=01d20000 edi=00140000
eip=001405f3 esp=01d1fc54 ebp=01d1fd80 iopl=0 nv up ei pl nz na pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000203

function: <nosymbols>
001405db 0c0d or al,0xd
001405dd 0000 add [eax],al
001405df 85c0 test eax,eax
001405e1 7409 jz 001405ec
001405e3 83f8ff cmp eax,0xffffffff
001405e6 7404 jz 001405ec
001405e8 01c6 add esi,eax
001405ea ebdf jmp 001405cb
001405ec 8b85e4feffff mov eax,[ebp-0x11c]
001405f2 40 inc eax
FAULT ->001405f3 81380d0a0d0a cmp dword ptr [eax],0xa0d0a0d ds:0023:01e46ffd=????????
001405f9 75f7 jnz 001405f2
001405fb 83c004 add eax,0x4
001405fe 29c6 sub esi,eax
00140600 898524010000 mov [ebp+0x124],eax
00140606 6a00 push 0x0
00140608 ff750c push dword ptr [ebp+0xc]
0014060b ff97640d0000 call dword ptr [edi+0xd64]
00140611 83f8ff cmp eax,0xffffffff
00140614 742a jz 00140640
00140616 8985e0feffff mov [ebp-0x120],eax

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01d1fd80 001408c1 001410e8 01d1fdb4 01400000 0x1405f3
01d1ffb4 7c80b50b 000003f4 00000000 01c801c6 0x1408c1
01d1ffec 00000000 001407c0 000003f4 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001d1fc54 e8 10 14 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fc64 00 00 d2 01 02 00 00 50 - 46 54 e1 8a 00 00 00 00 .......PFT......
0000000001d1fc74 00 00 00 00 0c 04 00 00 - 58 00 00 00 47 45 54 20 ........X...GET
0000000001d1fc84 2f 34 34 34 2e 6a 70 67 - 20 48 54 54 50 2f 31 2e /444.jpg HTTP/1.
0000000001d1fc94 31 0d 0a 48 6f 73 74 3a - 20 77 77 77 2e 62 65 73 1..Host: www.bes
0000000001d1fca4 74 63 68 65 61 70 64 6f - 6d 61 69 6e 72 65 67 69 tcheapdomainregi
0000000001d1fcb4 73 74 72 61 74 69 6f 6e - 2e 69 6e 66 6f 0d 0a 43 stration.info..C
0000000001d1fcc4 6f 6e 6e 65 63 74 69 6f - 6e 3a 20 43 6c 6f 73 65 onnection: Close
0000000001d1fcd4 0d 0a 0d 0a 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fce4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fcf4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fd04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fd14 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fd24 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fd34 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fd44 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fd54 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fd64 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d1fd74 00 00 00 00 00 00 00 00 - 00 00 00 00 b4 ff d1 01 ................
0000000001d1fd84 c1 08 14 00 e8 10 14 00 - b4 fd d1 01 00 00 40 01 ..............@.

*----> State Dump for Thread Id 0x3c4 <----*

eax=00000040 ebx=7c901005 ecx=021ac560 edx=7d73eda8 esi=00000434 edi=00000000
eip=7c90eb94 esp=0236ff14 ebp=0236ff78 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\mshtml.dll -
ChildEBP RetAddr Args to Child
0236ff78 7c802542 00000434 000927c0 00000000 ntdll!KiFastSystemCallRet
0236ff8c 7d5236af 00000434 000927c0 00000005 kernel32!WaitForSingleObject+0x12
0236ffb4 7c80b50b 01e52a90 00000005 0019d5dc mshtml+0x836af
0236ffec 00000000 7d586b9f 01e52a90 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000236ff14 c0 e9 90 7c db 25 80 7c - 34 04 00 00 00 00 00 00 ...|.%.|4.......
000000000236ff24 48 ff 36 02 00 00 00 00 - 90 2a e5 01 05 10 90 7c H.6......*.....|
000000000236ff34 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000236ff44 10 00 00 00 00 44 5f 9a - fe ff ff ff 00 c0 fd 7f .....D_.........
000000000236ff54 00 40 fd 7f 48 ff 36 02 - 40 e7 1a 02 28 ff 36 02 .@..H.6.@...(.6.
000000000236ff64 17 0f 51 7d dc ff 36 02 - f3 99 83 7c 08 26 80 7c ..Q}..6....|.&.|
000000000236ff74 00 00 00 00 8c ff 36 02 - 42 25 80 7c 34 04 00 00 ......6.B%.|4...
000000000236ff84 c0 27 09 00 00 00 00 00 - b4 ff 36 02 af 36 52 7d .'........6..6R}
000000000236ff94 34 04 00 00 c0 27 09 00 - 05 00 00 00 90 2a e5 01 4....'.......*..
000000000236ffa4 90 2a e5 01 da 6b 58 7d - dc d5 19 00 ac 6b 58 7d .*...kX}.....kX}
000000000236ffb4 ec ff 36 02 0b b5 80 7c - 90 2a e5 01 05 00 00 00 ..6....|.*......
000000000236ffc4 dc d5 19 00 90 2a e5 01 - 00 40 fd 7f 00 06 7c 86 .....*...@....|.
000000000236ffd4 c0 ff 36 02 b0 40 9f 85 - ff ff ff ff f3 99 83 7c ..6..@.........|
000000000236ffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
000000000236fff4 9f 6b 58 7d 90 2a e5 01 - 00 00 00 00 01 01 01 01 .kX}.*..........
0000000002370004 01 01 01 01 01 01 01 01 - 01 01 01 01 01 01 01 01 ................
0000000002370014 01 01 01 01 01 01 01 01 - 01 01 01 01 01 01 01 01 ................
0000000002370024 01 01 01 01 01 01 01 01 - 01 01 01 01 01 01 01 01 ................
0000000002370034 01 01 01 01 01 01 01 01 - 01 01 01 01 01 01 01 01 ................
0000000002370044 01 01 01 01 01 01 01 01 - 01 01 01 01 01 01 01 01 ................

*----> State Dump for Thread Id 0x3d4 <----*

eax=000000fe ebx=7c901005 ecx=040075f0 edx=00001000 esi=0000055c edi=00000000
eip=7c90eb94 esp=0292ff14 ebp=0292ff78 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0292ff78 7c802542 0000055c 000927c0 00000000 ntdll!KiFastSystemCallRet
0292ff8c 7d5236af 0000055c 000927c0 77264532 kernel32!WaitForSingleObject+0x12
0292ffb4 7c80b50b 01e95b90 77264532 00000004 mshtml+0x836af
0292ffec 00000000 7d586b9f 01e95b90 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000292ff14 c0 e9 90 7c db 25 80 7c - 5c 05 00 00 00 00 00 00 ...|.%.|\.......
000000000292ff24 48 ff 92 02 00 00 00 00 - 90 5b e9 01 05 10 90 7c H........[.....|
000000000292ff34 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000292ff44 10 00 00 00 00 44 5f 9a - fe ff ff ff 00 c0 fd 7f .....D_.........
000000000292ff54 00 d0 fa 7f 48 ff 92 02 - 70 dc 53 7d 28 ff 92 02 ....H...p.S}(...
000000000292ff64 e8 5b e9 01 dc ff 92 02 - f3 99 83 7c 08 26 80 7c .[.........|.&.|
000000000292ff74 00 00 00 00 8c ff 92 02 - 42 25 80 7c 5c 05 00 00 ........B%.|\...
000000000292ff84 c0 27 09 00 00 00 00 00 - b4 ff 92 02 af 36 52 7d .'...........6R}
000000000292ff94 5c 05 00 00 c0 27 09 00 - 32 45 26 77 90 5b e9 01 \....'..2E&w.[..
000000000292ffa4 90 5b e9 01 da 6b 58 7d - 04 00 00 00 ac 6b 58 7d .[...kX}.....kX}
000000000292ffb4 ec ff 92 02 0b b5 80 7c - 90 5b e9 01 32 45 26 77 .......|.[..2E&w
000000000292ffc4 04 00 00 00 90 5b e9 01 - 00 d0 fa 7f 00 06 7c 86 .....[........|.
000000000292ffd4 c0 ff 92 02 c8 bd ca 85 - ff ff ff ff f3 99 83 7c ...............|
000000000292ffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
000000000292fff4 9f 6b 58 7d 90 5b e9 01 - 00 00 00 00 00 00 00 00 .kX}.[..........
0000000002930004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002930014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002930024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002930034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002930044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x548 <----*

eax=72d230e8 ebx=02c2fef8 ecx=00000067 edx=0013b5b0 esi=00000000 edi=7ffdc000
eip=7c90eb94 esp=02c2fed0 ebp=02c2ff6c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\wdmaud.drv -
ChildEBP RetAddr Args to Child
02c2ff6c 7c809c86 00000002 02c2ffa4 00000000 ntdll!KiFastSystemCallRet
02c2ff88 72d2312a 00000002 02c2ffa4 00000000 kernel32!WaitForMultipleObjects+0x18
02c2ffb4 7c80b50b 00000000 7c913281 7c913288 wdmaud!midMessage+0x348
02c2ffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000002c2fed0 ab e9 90 7c f2 94 80 7c - 02 00 00 00 f8 fe c2 02 ...|...|........
0000000002c2fee0 01 00 00 00 00 00 00 00 - 00 00 00 00 81 32 91 7c .............2.|
0000000002c2fef0 00 00 00 00 00 00 00 00 - bc 05 00 00 b0 05 00 00 ................
0000000002c2ff00 a0 4d 9c 85 d6 00 f8 00 - 08 cf 4c e1 a0 4d 9c 85 .M........L..M..
0000000002c2ff10 de 2d 4e 80 bc c1 97 85 - 14 00 00 00 01 00 00 00 .-N.............
0000000002c2ff20 70 9c 20 00 00 00 00 00 - 00 00 00 00 54 c0 97 85 p. .........T...
0000000002c2ff30 00 1a 7c 86 ea b5 57 80 - 00 c0 fd 7f 00 c0 fa 7f ..|...W.........
0000000002c2ff40 00 c0 fa 7f 00 00 00 00 - f8 fe c2 02 00 00 00 00 ................
0000000002c2ff50 02 00 00 00 ec fe c2 02 - 00 00 00 00 dc ff c2 02 ................
0000000002c2ff60 f3 99 83 7c 90 95 80 7c - 00 00 00 00 88 ff c2 02 ...|...|........
0000000002c2ff70 86 9c 80 7c 02 00 00 00 - a4 ff c2 02 00 00 00 00 ...|............
0000000002c2ff80 ff ff ff ff 00 00 00 00 - b4 ff c2 02 2a 31 d2 72 ............*1.r
0000000002c2ff90 02 00 00 00 a4 ff c2 02 - 00 00 00 00 ff ff ff ff ................
0000000002c2ffa0 88 32 91 7c bc 05 00 00 - b0 05 00 00 00 00 00 00 .2.|............
0000000002c2ffb0 dc e2 90 7c ec ff c2 02 - 0b b5 80 7c 00 00 00 00 ...|.......|....
0000000002c2ffc0 81 32 91 7c 88 32 91 7c - 00 00 00 00 00 c0 fa 7f .2.|.2.|........
0000000002c2ffd0 00 06 7c 86 c0 ff c2 02 - c8 7b 97 85 ff ff ff ff ..|......{......
0000000002c2ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000002c2fff0 00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00 .....0.r........
0000000002c30000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xf18 <----*

eax=00000000 ebx=000005f4 ecx=00234684 edx=0401b9a0 esi=02d2ff98 edi=77d51042
eip=7c90eb94 esp=02d2ff54 ebp=02d2ff78 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\WINDOWS\system32\WINMM.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
02d2ff78 76b44e3d 02d2ff98 00000000 00000000 ntdll!KiFastSystemCallRet
02d2ffb4 7c80b50b 000005f4 00000200 0000002b WINMM!PlaySoundW+0x7e6
02d2ffec 00000000 76b44dd6 000005f4 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000002d2ff54 be 91 d4 77 82 10 d5 77 - 98 ff d2 02 00 00 00 00 ...w...w........
0000000002d2ff64 00 00 00 00 00 00 00 00 - f4 05 00 00 42 10 d5 77 ............B..w
0000000002d2ff74 00 00 00 00 b4 ff d2 02 - 3d 4e b4 76 98 ff d2 02 ........=N.v....
0000000002d2ff84 00 00 00 00 00 00 00 00 - 00 00 00 00 00 02 00 00 ................
0000000002d2ff94 2b 00 00 00 74 03 04 00 - bc 03 00 00 f0 74 23 00 +...t........t#.
0000000002d2ffa4 00 00 00 00 44 7c 39 02 - 3f 03 00 00 64 01 00 00 ....D|9.?...d...
0000000002d2ffb4 ec ff d2 02 0b b5 80 7c - f4 05 00 00 00 02 00 00 .......|........
0000000002d2ffc4 2b 00 00 00 f4 05 00 00 - 00 b0 fa 7f 00 06 7c 86 +.............|.
0000000002d2ffd4 c0 ff d2 02 c0 64 3a 86 - ff ff ff ff f3 99 83 7c .....d:........|
0000000002d2ffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
0000000002d2fff4 d6 4d b4 76 f4 05 00 00 - 00 00 00 00 08 00 00 00 .M.v............
0000000002d30004 00 01 00 01 ee ff ee ff - 00 00 00 00 00 00 16 00 ................
0000000002d30014 00 70 01 00 00 00 d3 02 - 00 01 00 00 40 00 d3 02 .p..........@...
0000000002d30024 00 00 e3 02 25 00 00 00 - 07 00 00 00 90 02 1a 03 ....%...........
0000000002d30034 00 00 00 00 d0 df e0 02 - 00 00 00 00 43 00 08 00 ............C...
0000000002d30044 84 01 0c 01 80 b8 d5 02 - 74 1a ed 03 bc 0d ed 03 ........t.......
0000000002d30054 54 00 d3 02 54 00 d3 02 - 00 00 00 00 00 00 00 00 T...T...........
0000000002d30064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002d30074 00 00 00 00 a0 1a ed 03 - f8 6b 05 04 40 2e 19 00 .........k..@...
0000000002d30084 00 00 00 00 90 00 cc 00 - 48 43 6f 6e 00 00 00 00 ........HCon....

*----> State Dump for Thread Id 0xf40 <----*

eax=00000000 ebx=00000000 ecx=02dd7ba0 edx=7c90eb94 esi=001632e0 edi=00163384
eip=7c90eb94 esp=03acfe1c ebp=03acff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
03acff80 77e76c22 03acffa8 77e76a3b 001632e0 ntdll!KiFastSystemCallRet
03acff88 77e76a3b 001632e0 00000000 01000178 RPCRT4!I_RpcBCacheFree+0x5ea
03acffa8 77e76c0a 001796d0 03acffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
03acffb4 7c80b50b 02dd7ba0 00000000 01000178 RPCRT4!I_RpcBCacheFree+0x5d2
03acffec 00000000 77e76bf0 02dd7ba0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000003acfe1c 99 e3 90 7c 03 67 e7 77 - 88 02 00 00 70 ff ac 03 ...|.g.w....p...
0000000003acfe2c 00 00 00 00 40 de 1e 00 - 4c ff ac 03 2f c5 57 80 ....@...L.../.W.
0000000003acfe3c 4a c5 57 80 64 ed 01 b9 - 0c fc 81 01 aa c4 57 80 J.W.d.........W.
0000000003acfe4c 98 2e 46 e3 02 eb 01 b9 - 00 00 bb 85 a0 1b 00 e1 ..F.............
0000000003acfe5c c8 a4 65 e3 ec eb 01 b9 - c0 a4 65 e3 00 00 00 02 ..e.......e.....
0000000003acfe6c 04 00 00 00 f3 fa 5f 80 - 02 00 00 00 0c 00 00 00 ......_.........
0000000003acfe7c c8 a4 65 e3 00 00 00 00 - 00 00 00 00 c0 14 be e1 ..e.............
0000000003acfe8c ec eb 01 b9 00 00 00 02 - 14 ec 01 b9 38 bb 56 80 ............8.V.
0000000003acfe9c c0 14 be e1 40 5a 64 e2 - a4 a4 65 e3 98 2e 46 e3 ....@Zd...e...F.
0000000003acfeac 01 00 00 00 00 00 00 00 - 14 ec 01 b9 3e bb 56 80 ............>.V.
0000000003acfebc c0 14 be e1 d0 ec 01 b9 - 88 ec 01 b9 cf 4a 56 80 .............JV.
0000000003acfecc 00 00 00 02 00 00 00 00 - 00 e4 1a 00 00 e4 1a 00 ................
0000000003acfedc 00 00 00 00 00 00 00 00 - d0 ec 01 b9 88 ec 01 b9 ................
0000000003acfeec c0 14 be e1 98 2e 46 e3 - 40 5a 64 e2 00 00 00 00 ......F.@Zd.....
0000000003acfefc 68 ec 01 b9 a4 a4 65 e3 - 01 00 00 00 28 ec 01 01 h.....e.....(...
0000000003acff0c 00 00 00 00 00 00 00 00 - bc d1 92 85 24 ec 01 b9 ............$...
0000000003acff1c b2 c2 4d 80 ba c2 4d 80 - 8c d1 92 85 20 d0 92 85 ..M...M..... ...
0000000003acff2c 54 d0 92 85 80 ff ac 03 - 99 66 e7 77 4c ff ac 03 T........f.wL...
0000000003acff3c a9 66 e7 77 ed 10 90 7c - a8 7c 20 00 a0 7b dd 02 .f.w...|.| ..{..
0000000003acff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0xbf8 <----*

eax=7d586b9f ebx=0231503a ecx=0790c460 edx=00000000 esi=00000f5c edi=00000000
eip=7c90eb94 esp=08acff08 ebp=08acff6c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
08acff6c 7c802542 00000f5c ffffffff 00000000 ntdll!KiFastSystemCallRet
08acff80 7d66a62b 00000f5c ffffffff 07ab50b6 kernel32!WaitForSingleObject+0x12
08acffa4 7d586bda 079f1000 7d586bac 08acffec mshtml+0x1ca62b
08acffb4 7c80b50b 0218a100 07ab50b6 079f1000 mshtml+0xe6bda
08acffec 00000000 7d586b9f 0218a100 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000008acff08 c0 e9 90 7c db 25 80 7c - 5c 0f 00 00 00 00 00 00 ...|.%.|\.......
0000000008acff18 00 00 00 00 44 a1 18 02 - 00 a1 18 02 3a 50 31 02 ....D.......:P1.
0000000008acff28 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000008acff38 10 00 00 00 c0 10 f8 ff - ff ff ff ff 00 c0 fd 7f ................
0000000008acff48 00 00 fa 7f 00 00 00 00 - 02 01 00 00 1c ff ac 08 ................
0000000008acff58 6b cd 50 7d dc ff ac 08 - f3 99 83 7c 08 26 80 7c k.P}.......|.&.|
0000000008acff68 00 00 00 00 80 ff ac 08 - 42 25 80 7c 5c 0f 00 00 ........B%.|\...
0000000008acff78 ff ff ff ff 00 00 00 00 - a4 ff ac 08 2b a6 66 7d ............+.f}
0000000008acff88 5c 0f 00 00 ff ff ff ff - b6 50 ab 07 00 a1 18 02 \........P......
0000000008acff98 00 a1 18 02 00 00 00 00 - ff ff ff ff b4 ff ac 08 ................
0000000008acffa8 da 6b 58 7d 00 10 9f 07 - ac 6b 58 7d ec ff ac 08 .kX}.....kX}....
0000000008acffb8 0b b5 80 7c 00 a1 18 02 - b6 50 ab 07 00 10 9f 07 ...|.....P......
0000000008acffc8 00 a1 18 02 00 00 fa 7f - 00 06 7c 86 c0 ff ac 08 ..........|.....
0000000008acffd8 38 c1 b3 85 ff ff ff ff - f3 99 83 7c 18 b5 80 7c 8..........|...|
0000000008acffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 9f 6b 58 7d .............kX}
0000000008acfff8 00 a1 18 02 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000008ad0008 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000008ad0018 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000008ad0028 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000008ad0038 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xb0c <----*

eax=00000000 ebx=00000000 ecx=000009a8 edx=20004a92 esi=002188c0 edi=00000000
eip=7c90eb94 esp=033cec40 ebp=033cee9c iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
033cee9c 75faeab5 02dadb78 033cef5c 02dadb78 ntdll!KiFastSystemCallRet
033cef30 75faed7d 02dadb78 7c910732 00000005 BROWSEUI!Ordinal107+0xbff6
033cffb4 7c80b50b 02dadb78 7c910732 00000005 BROWSEUI!Ordinal102+0x22c
033cffec 00000000 778335d9 02dadb78 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000033cec40 18 94 d4 77 99 e9 fa 75 - 5c ef 3c 03 00 00 00 00 ...w...u\.<.....
00000000033cec50 00 00 00 00 e2 04 04 00 - 13 01 00 00 01 00 00 00 ................
00000000033cec60 00 00 00 00 59 7d 3a 02 - 1e 00 00 00 3c 01 00 00 ....Y}:.....<...
00000000033cec70 01 00 00 00 01 44 00 80 - c0 88 21 00 c0 cf 16 00 .....D....!.....
00000000033cec80 e8 04 09 00 80 9d f0 03 - 01 00 00 00 00 00 00 00 ................
00000000033cec90 4d 00 69 00 63 00 72 00 - 6f 00 73 00 6f 00 66 00 M.i.c.r.o.s.o.f.
00000000033ceca0 74 00 20 00 49 00 6e 00 - 74 00 65 00 72 00 6e 00 t. .I.n.t.e.r.n.
00000000033cecb0 65 00 74 00 20 00 45 00 - 78 00 70 00 6c 00 6f 00 e.t. .E.x.p.l.o.
00000000033cecc0 72 00 65 00 72 00 00 00 - 00 00 00 00 00 00 00 00 r.e.r...........
00000000033cecd0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000033cece0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000033cecf0 00 00 00 00 00 00 00 00 - 08 00 00 00 00 00 00 00 ................
00000000033ced00 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000033ced10 00 00 00 00 00 00 00 00 - 78 00 d7 02 00 00 00 00 ........x.......
00000000033ced20 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000033ced30 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000033ced40 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000033ced50 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000033ced60 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000033ced70 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> Symbol Table <----*
Error 0x80004005

_________________
<p><font color="#990000">"I regret not what I've done, but what I didn't do."</font></p>
<p><a href="http://brandonbatson.com"><font color="#000066"><b><font color="#006666">http://brandonbatson.com
</font></b></font></a> </p>


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 11:41 am 
Member
User avatar

Joined: Wed Mar 01, 2000 2:01 pm
Posts: 747
Location: Salem, OR, USA
Psyco wrote:
Emcee.. I considered that when this started happening.. but this didn't happen the first few days with the regular wallmaster.. it started a couple days after I had upgraded to wallmaster PRO.. which has been uninstalled.. Didn't change anything.


You may still want to run Spybot and Adaware just in case the demo version of Wallmaster left some nasties behind... then do a fresh install of WMPro.

Just a thought..... but I get the feeling I trying to teach my granny to suck eggs :)

edit: just seen your previous post:

"App: F:\Program Files\Internet Explorer\IEXPLORE.EXE (pid=3060)" etc... yikes!

I am aware that Internet Explorer is almost impossible to uninstall but maybe try using another browser (I recommend Firefox) and set is as your default browser.

edit2:

it seems like at least some errors stem from DLLs, maybe worth checking.
http://www.arachnoid.com/lutusp/dll_article.html


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 12:48 pm 
Member

Joined: Sat Feb 26, 2000 2:01 pm
Posts: 621
Location: Mississippi , USA
I've never been a big spybot fan.. I've been having very very good results using just Adaware and Microsofts spyware package..


The main error..
*** ERROR: Symbol file could not be found. Defaulted to export symbols for.......




All the information I'm finding on it says that its a problem that has to be fixed when writing the program.. whatever is making all of them do it.. I have no clue.. The only fix I've seen sofar is reinstall all the crashing programs.. Friggin A..

_________________
<p><font color="#990000">"I regret not what I've done, but what I didn't do."</font></p>
<p><a href="http://brandonbatson.com"><font color="#000066"><b><font color="#006666">http://brandonbatson.com
</font></b></font></a> </p>


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 12:57 pm 
Glow Ball
User avatar

Joined: Tue Feb 02, 1999 7:00 pm
Posts: 23
Quote:
Phin.. I thought about it, but I've never used the restore points before.. does everything go back to where I restore or just windows?


Any time I've used it, it restores "everything" not just windows.


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 1:18 pm 
Member

Joined: Sat Feb 26, 2000 2:01 pm
Posts: 621
Location: Mississippi , USA
Great... :/


I wish I knew what caused this...

_________________
<p><font color="#990000">"I regret not what I've done, but what I didn't do."</font></p>
<p><a href="http://brandonbatson.com"><font color="#000066"><b><font color="#006666">http://brandonbatson.com
</font></b></font></a> </p>


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 2:06 pm 
Member

Joined: Sat Feb 26, 2000 2:01 pm
Posts: 621
Location: Mississippi , USA
Ran SB.. ALl it found was the cookies I keep telling the other two not to delete..



[bump]

_________________
<p><font color="#990000">"I regret not what I've done, but what I didn't do."</font></p>
<p><a href="http://brandonbatson.com"><font color="#000066"><b><font color="#006666">http://brandonbatson.com
</font></b></font></a> </p>


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 4:43 pm 
Member

Joined: Sat Feb 26, 2000 2:01 pm
Posts: 621
Location: Mississippi , USA
I ended up going back 3 weeks to a good restore point.. I lost alot of stuff.. but things work..

thanks for the help guys.

_________________
<p><font color="#990000">"I regret not what I've done, but what I didn't do."</font></p>
<p><a href="http://brandonbatson.com"><font color="#000066"><b><font color="#006666">http://brandonbatson.com
</font></b></font></a> </p>


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 5:26 pm 
Glow Ball
User avatar

Joined: Tue Feb 02, 1999 7:00 pm
Posts: 23
> I lost alot of stuff..

Hopefully not too much, and nothing that can't be replaced. After all, it could have been much worse.

> but things work..

[tu]


Top
 Profile  
 
 Post subject:
PostPosted: Sun Mar 12, 2006 9:45 pm 
Member
User avatar

Joined: Sun Oct 16, 2005 4:39 pm
Posts: 1822
Location: Winnipeg Manitoba, Canada
ive seen adaware miss things like internet optimizer which you can get very easily, its super common. so i dont trust adware to guard my system. spybot alone has been guarding my win 95 for 2 years no (not even an antivirus)

_________________
Image


Top
 Profile  
 
 Post subject:
PostPosted: Mon Mar 13, 2006 4:14 pm 
Member

Joined: Mon Feb 20, 2006 1:50 pm
Posts: 81
man SB rules i computer company tested it they put it on a computer with spyware that they knew of and it found all of it and ever some they did not know was on there


Top
 Profile  
 
Display posts from previous:  Sort by  
Post new topic Reply to topic  [ 35 posts ]  Go to page Previous  1, 2   


Who is online

Users browsing this forum: Bing [Bot] and 184 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Search for:
Jump to:  
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group