Avatar of Ace45
Ace45 asked on

I am getting application errors when closing Internet Explorer

Hi Experts,

As the subject states I am getting application errors. Initially with Acrobat IEHelper add in enabled for Internet explorer, I get the following:

Acrobat IEHelper: iexplore.exe - Application Error
The instruction at "0x2411e10" referenced memory at "0x01d1f238". The memory could not be "read".
Click on Ok to terminate the program

When I disable Acrobat IEHelper add in and restart the browser I get the following error when closing Internet Explorer:

iexplore.exe - Application Error
The instruction at "0x2411e10" referenced memory at "0x01d1f238". The memory could not be "read".
Click on Ok to terminate the program


I do not know why this is happening. I am running on Windows XP Home Edition Version 2002 Service Pack 2. I have used Microsoft Spyware to check my computer for Spyware, it found nothing. I also used the IEFix utility but that didn't help.

Do you guys have any ideas to why this is happening and how I can eliminate it?



Windows XP

Avatar of undefined
Last Comment
Mr_Shaw

8/22/2022 - Mon
cpc2004

Your Winodws may be infected by virus or faulty ram. Attach the following files at any webspace. I will study your log and find out the culprit.
C:\Documents and Settings\All Users\Application Data\Microsoft\Dr Watson\drwtsn32.log
ASKER
Ace45

Here is the log:

Microsoft (R) DrWtsn32
Copyright (C) 1985-2001 Microsoft Corp. All rights reserved.



Application exception occurred:
        App: C:\WINDOWS\Explorer.EXE (pid=1696)
        When: 10/14/2004 @ 17:49:12.843
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: COMPUTERA
        User Name: Owner
        Terminal Session Id: 0
        Number of Processors: 2
        Processor Type: x86 Family 15 Model 3 Stepping 4
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 1
        Current Type: Multiprocessor Free
        Registered Organization:
        Registered Owner:  

*----> Task List <----*
   0 System Process
   4 System
 600 smss.exe
 660 csrss.exe
 684 winlogon.exe
 728 services.exe
 740 lsass.exe
 924 svchost.exe
1008 svchost.exe
1144 svchost.exe
1176 svchost.exe
1240 ccSetMgr.exe
1372 ccEvtMgr.exe
1600 spoolsv.exe
1696 Explorer.EXE
2004 acsd.exe
 156 navapsvc.exe
 460 wanmpsvc.exe
1688 zHotkey.exe
1756 PDVDServ.exe
1848 ccApp.exe
1816 mmtask.exe
1984 shwiconem.exe
 224 SOUNDMAN.EXE
 244 ALCWZRD.EXE
 208 msmsgs.exe
1132 BigFix.exe
2504 iexplore.exe
2604 wuauclt.exe
3320 drwtsn32.exe

*----> Module List <----*
(0000000001000000 - 00000000010f8000: C:\WINDOWS\Explorer.EXE
(0000000001200000 - 000000000121e000: C:\WINDOWS\System32\hccutils.DLL
(0000000001220000 - 0000000001421000: C:\WINDOWS\System32\msi.dll
(0000000001620000 - 0000000001648000: C:\WINDOWS\System32\igfxres.dll
(0000000001ab0000 - 0000000001ad4000: C:\WINDOWS\System32\igfxdev.dll
(0000000001ae0000 - 0000000001aeb000: C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
(0000000001b00000 - 0000000001b57000: C:\WINDOWS\System32\igfxsrvc.dll
(0000000001bf0000 - 0000000001c08000: C:\Program Files\Norton AntiVirus\NavShExt.dll
(0000000007260000 - 0000000007299000: C:\WINDOWS\System32\WMASF.DLL
(0000000008530000 - 000000000872d000: C:\WINDOWS\System32\WMVCore.DLL
(000000000ffd0000 - 000000000fff3000: C:\WINDOWS\System32\rsaenh.dll
(0000000010000000 - 000000001003c000: C:\WINDOWS\System32\igfxpph.dll
(000000001a400000 - 000000001a47a000: C:\WINDOWS\system32\urlmon.dll
(00000000559e0000 - 0000000055a51000: C:\WINDOWS\System32\themeui.dll
(000000005ad70000 - 000000005ada4000: C:\WINDOWS\System32\UxTheme.dll
(000000005cad0000 - 000000005caf1000: C:\WINDOWS\System32\shmedia.dll
(0000000063000000 - 0000000063096000: C:\WINDOWS\system32\WININET.dll
(0000000063180000 - 00000000631e5000: C:\WINDOWS\system32\SHLWAPI.dll
(000000006c1b0000 - 000000006c1f4000: C:\WINDOWS\System32\DUSER.dll
(0000000071700000 - 0000000071849000: C:\WINDOWS\System32\SHDOCVW.dll
(0000000071950000 - 0000000071a34000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.10.0_x-ww_f7fb5805\comctl32.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac5000: C:\WINDOWS\system32\WS2_32.dll
(0000000071b20000 - 0000000071b31000: C:\WINDOWS\system32\MPR.dll
(0000000071bf0000 - 0000000071c01000: C:\WINDOWS\System32\SAMLIB.dll
(0000000071c10000 - 0000000071c1d000: C:\WINDOWS\System32\ntlanman.dll
(0000000071c20000 - 0000000071c6e000: C:\WINDOWS\System32\netapi32.dll
(0000000071c80000 - 0000000071c86000: C:\WINDOWS\System32\NETRAP.dll
(0000000071c90000 - 0000000071ccc000: C:\WINDOWS\System32\NETUI1.dll
(0000000071cd0000 - 0000000071ce6000: C:\WINDOWS\System32\NETUI0.dll
(0000000071d40000 - 0000000071d5b000: C:\WINDOWS\System32\actxprxy.dll
(0000000072430000 - 0000000072442000: C:\WINDOWS\System32\browselc.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\System32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\System32\wdmaud.drv
(0000000073000000 - 0000000073023000: C:\WINDOWS\System32\WINSPOOL.DRV
(0000000073b50000 - 0000000073b65000: C:\WINDOWS\System32\AVIFIL32.dll
(0000000073bd0000 - 0000000073bf0000: C:\WINDOWS\System32\MSVFW32.dll
(0000000074770000 - 00000000747ff000: C:\WINDOWS\System32\mlang.dll
(0000000074ad0000 - 0000000074ad7000: C:\WINDOWS\System32\POWRPROF.dll
(0000000074ae0000 - 0000000074ae7000: C:\WINDOWS\System32\CFGMGR32.dll
(0000000074af0000 - 0000000074af9000: C:\WINDOWS\System32\BatMeter.dll
(0000000074b00000 - 0000000074b20000: C:\WINDOWS\System32\stobject.dll
(0000000074b30000 - 0000000074b71000: C:\WINDOWS\System32\webcheck.dll
(0000000074b80000 - 0000000074c02000: C:\WINDOWS\System32\printui.dll
(0000000075a70000 - 0000000075b15000: C:\WINDOWS\system32\USERENV.dll
(0000000075cf0000 - 0000000075e81000: C:\WINDOWS\system32\NETSHELL.dll
(0000000075e90000 - 0000000075f37000: C:\WINDOWS\System32\SXS.DLL
(0000000075f40000 - 0000000075f5f000: C:\WINDOWS\system32\appHelp.dll
(0000000075f60000 - 0000000075f66000: C:\WINDOWS\System32\drprov.dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davclnt.dll
(0000000075f80000 - 000000007607c000: C:\WINDOWS\System32\BROWSEUI.dll
(0000000076170000 - 00000000761f8000: C:\WINDOWS\System32\shdoclc.dll
(00000000762a0000 - 00000000762b0000: C:\WINDOWS\system32\MSASN1.dll
(00000000762c0000 - 0000000076348000: C:\WINDOWS\system32\CRYPT32.dll
(0000000076360000 - 000000007636f000: C:\WINDOWS\System32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG32.dll
(0000000076600000 - 000000007661b000: C:\WINDOWS\System32\CSCDLL.dll
(0000000076620000 - 000000007666e000: C:\WINDOWS\System32\cscui.dll
(0000000076670000 - 0000000076757000: C:\WINDOWS\System32\SETUPAPI.dll
(0000000076980000 - 0000000076987000: C:\WINDOWS\System32\LINKINFO.dll
(0000000076990000 - 00000000769b4000: C:\WINDOWS\System32\ntshrui.dll
(0000000076b20000 - 0000000076b35000: C:\WINDOWS\System32\ATL.DLL
(0000000076b40000 - 0000000076b6c000: C:\WINDOWS\System32\WINMM.dll
(0000000076c00000 - 0000000076c2d000: C:\WINDOWS\system32\credui.dll
(0000000076c30000 - 0000000076c5b000: C:\WINDOWS\System32\WINTRUST.dll
(0000000076c90000 - 0000000076cb2000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076ce0000 - 0000000076cff000: C:\WINDOWS\System32\NTMARTA.DLL
(0000000076d60000 - 0000000076d77000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e10000 - 0000000076e35000: C:\WINDOWS\System32\adsldpc.dll
(0000000076e40000 - 0000000076e6f000: C:\WINDOWS\System32\ACTIVEDS.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076f90000 - 0000000076fa0000: C:\WINDOWS\System32\Secur32.dll
(0000000077050000 - 0000000077115000: C:\WINDOWS\System32\COMRes.dll
(0000000077120000 - 00000000771ab000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 00000000772d4000: C:\WINDOWS\system32\ole32.dll
(0000000077340000 - 00000000773cb000: C:\WINDOWS\system32\comctl32.dll
(00000000773d0000 - 0000000077bc2000: C:\WINDOWS\system32\SHELL32.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\System32\midimap.dll
(0000000077be0000 - 0000000077bf4000: C:\WINDOWS\System32\MSACM32.dll
(0000000077c00000 - 0000000077c07000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c63000: C:\WINDOWS\system32\msvcrt.dll
(0000000077d40000 - 0000000077dcc000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e5d000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e60000 - 0000000077f46000: C:\WINDOWS\system32\kernel32.dll
(0000000077f50000 - 0000000077ff7000: C:\WINDOWS\System32\ntdll.dll
(0000000078000000 - 0000000078087000: C:\WINDOWS\system32\RPCRT4.dll
(000000007c000000 - 000000007c054000: C:\WINDOWS\System32\MSVCR70.dll
(000000007c080000 - 000000007c0f7000: C:\WINDOWS\System32\MSVCP70.dll
(000000007c890000 - 000000007c911000: C:\WINDOWS\System32\CLBCATQ.DLL
(000000007e090000 - 000000007e0d1000: C:\WINDOWS\system32\GDI32.dll

*----> State Dump for Thread Id 0x6a4 <----*

eax=00000000 ebx=003415e8 ecx=00000000 edx=aa76e174 esi=004781e0 edi=00000020
eip=7ffe0304 esp=0006f500 ebp=0006f550 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0000  es=0400  fs=003b  gs=0500             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\System32\SHDOCVW.dll -
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\System32\BROWSEUI.dll -
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\SHELL32.dll -
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\System32\ntdll.dll -
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.10.0_x-ww_f7fb5805\comctl32.dll -
*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\Explorer.EXE
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr  Args to Child              
0006f4fc 77d4582b 77d4537e 00010086 00000020 *SharedUserSystemCall+0xc (FPO: [0,0,0])
0006f550 77d458ce 00010086 00000020 0001008c USER32!SetRect+0x15d
0006f5b0 71706036 00010086 00000020 0001008c USER32!DefWindowProcW+0xa0
0006f5d0 75f81c14 000d2064 00010086 00000020 SHDOCVW!Ordinal191+0xd72
0006f5ec 775260d5 000d13ec 00010086 00000020 BROWSEUI!Ordinal116+0x1c14
0006f644 77526999 000c8940 00010086 00000020 SHELL32!SHCreateLocalServerRunDll+0x810
0006f66c 77d43a50 000c8920 00000020 0001008c SHELL32!SHCreateLocalServerRunDll+0x10d4
0006f698 77d43b1f 7752693d 00010086 00000020 USER32+0x3a50
0006f700 77d444f5 00083d30 7752693d 00010086 USER32+0x3b1f
0006f754 77d44525 004781e0 00000020 0001008c USER32!PostMessageA+0xad
0006f77c 77f75da3 0006f78c 00000018 004781e0 USER32!PostMessageA+0xdd
0006f7f4 77d458ce 0001008a 00000020 0001008c ntdll!KiUserCallbackDispatcher+0x13
0006f854 77458571 0001008a 00000020 0001008c USER32!DefWindowProcW+0xa0
0006f9c8 77458fd7 0001008a 00000020 0001008c SHELL32!DAD_AutoScroll+0xb13f
0006f9f0 77d43a50 0001008a 00000020 0001008c SHELL32!SHCreateShellFolderView+0x322
0006fa1c 77d43b1f 77458f7b 0001008a 00000020 USER32+0x3a50
0006fa84 77d444f5 00083d30 77458f7b 0001008a USER32+0x3b1f
0006fad8 77d44525 00478430 00000020 0001008c USER32!PostMessageA+0xad
0006fb00 77f75da3 0006fb10 00000018 00478430 USER32!PostMessageA+0xdd
0006fb78 77d458ce 0001008c 00000020 0001008c ntdll!KiUserCallbackDispatcher+0x13
0006fbd8 719a80d6 0001008c 00000020 0001008c USER32!DefWindowProcW+0xa0
0006fd34 77d43a50 0001008c 00000020 0001008c comctl32!Ordinal384+0x333e4
0006fd60 77d43b1f 719a8008 0001008c 00000020 USER32+0x3a50
0006fdc8 77d444f5 00083d30 719a8008 0001008c USER32+0x3b1f
0006fe1c 77d44525 004784e0 00000020 0001008c USER32!PostMessageA+0xad
0006fe44 77f75da3 0006fe54 00000018 004784e0 USER32!PostMessageA+0xdd
0006fe94 77d43fd4 0006fee0 00000000 00000000 ntdll!KiUserCallbackDispatcher+0x13
0006fec0 77524cd8 0006fee0 00000000 00000000 USER32!PeekMessageW+0xe3
0006fefc 77524d3d 77e7a29b 000c8920 000c8920 SHELL32!Ordinal724+0x15eb
0006ff14 77524f56 00000000 0101243e 000c8920 SHELL32!Ordinal724+0x1650
0006ff5c 01016132 01000000 00000000 000205e2 SHELL32!Ordinal201+0x20
0006ffc0 77e814c7 00000000 00000000 7ffdf000 Explorer+0x16132
0006fff0 00000000 010160cc 00000000 78746341 kernel32!GetCurrentDirectoryW+0x44

*----> Raw Stack Dump <----*
000000000006f500  2b 58 d4 77 7e 53 d4 77 - 86 00 01 00 20 00 00 00  +X.w~S.w.... ...
000000000006f510  8c 00 01 00 01 00 00 02 - 00 00 00 00 9e 02 00 00  ................
000000000006f520  00 00 00 00 64 20 0d 00 - 20 00 00 00 40 89 0c 00  ....d .. ...@...
000000000006f530  14 00 00 00 6d 54 d4 77 - 86 00 01 00 48 06 28 00  ....mT.w....H.(.
000000000006f540  60 f5 06 00 b4 54 d4 77 - e0 81 47 00 e0 80 47 00  `....T.w..G...G.
000000000006f550  b0 f5 06 00 ce 58 d4 77 - 86 00 01 00 20 00 00 00  .....X.w.... ...
000000000006f560  8c 00 01 00 01 00 00 02 - 00 00 00 00 85 58 d4 77  .............X.w
000000000006f570  86 00 01 00 20 00 00 00 - 8c 00 01 00 01 00 00 02  .... ...........
000000000006f580  64 20 0d 00 20 00 00 00 - 40 89 0c 00 00 00 00 00  d .. ...@.......
000000000006f590  00 00 00 00 01 00 00 00 - 80 f5 06 00 86 00 01 00  ................
000000000006f5a0  f0 f6 06 00 0a 39 d7 77 - 38 9b d9 77 00 00 00 00  .....9.w8..w....
000000000006f5b0  d0 f5 06 00 36 60 70 71 - 86 00 01 00 20 00 00 00  ....6`pq.... ...
000000000006f5c0  8c 00 01 00 01 00 00 02 - 20 00 00 00 8c 00 01 00  ........ .......
000000000006f5d0  ec f5 06 00 14 1c f8 75 - 64 20 0d 00 86 00 01 00  .......ud ......
000000000006f5e0  20 00 00 00 8c 00 01 00 - 01 00 00 02 44 f6 06 00   ...........D...
000000000006f5f0  d5 60 52 77 ec 13 0d 00 - 86 00 01 00 20 00 00 00  .`Rw........ ...
000000000006f600  8c 00 01 00 01 00 00 02 - 86 00 01 00 20 89 0c 00  ............ ...
000000000006f610  00 00 00 00 3d 69 52 77 - 50 f6 06 00 bd 40 d4 77  ....=iRwP....@.w
000000000006f620  e0 81 47 00 00 00 00 00 - c6 40 d4 77 86 00 01 00  ..G......@.w....
000000000006f630  3d 69 52 77 00 00 00 00 - 2c f6 06 00 80 f7 06 00  =iRw....,.......

*----> State Dump for Thread Id 0x6b0 <----*

eax=00000001 ebx=001162f8 ecx=00e4fc80 edx=00000000 esi=00000000 edi=00000000
eip=7ffe0304 esp=00e4fe28 ebp=00e4ff90 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\GDI32.dll -
ChildEBP RetAddr  Args to Child              
00e4fe24 77f5c084 780016a4 00000148 00e4ff80 *SharedUserSystemCall+0xc (FPO: [0,0,0])
00e4ff90 78001601 780019d4 0009de70 77fa88f0 ntdll!NtReplyWaitReceivePortEx+0xc
000a8af8 ffffffff 00000160 00000164 00000000 RPCRT4+0x1601
00000000 00000000 00000000 00000000 00000000 0xffffffff

*----> Raw Stack Dump <----*
0000000000e4fe28  84 c0 f5 77 a4 16 00 78 - 48 01 00 00 80 ff e4 00  ...w...xH.......
0000000000e4fe38  00 00 00 00 f8 62 11 00 - 60 ff e4 00 fc ca 5e 80  .....b..`.....^.
0000000000e4fe48  00 d8 56 e2 04 d8 56 e2 - 00 00 00 00 54 2c 3c 82  ..V...V.....T,<.
0000000000e4fe58  00 ec 59 80 20 2c 3c 82 - d4 fb a0 aa 00 00 59 80  ..Y. ,<.......Y.
0000000000e4fe68  40 00 00 00 50 05 19 82 - 18 d8 56 e2 7e 01 00 00  @...P.....V.~...
0000000000e4fe78  22 e2 5a 80 54 00 00 00 - 00 00 00 00 05 00 00 00  ".Z.T...........
0000000000e4fe88  00 00 00 00 06 02 00 00 - 14 9f 4f 80 b8 57 ea 81  ..........O..W..
0000000000e4fe98  48 57 ea 81 ff ff ff ff - a9 bb 6b 80 98 fb a0 aa  HW........k.....
0000000000e4fea8  d8 af 6b 80 1c 00 00 00 - e1 00 00 00 ce 46 3c e1  ..k..........F<.
0000000000e4feb8  18 75 1c e2 78 0c 00 00 - 00 00 00 00 88 34 5d e1  .u..x........4].
0000000000e4fec8  43 95 5e 80 88 34 5d e1 - 28 01 00 00 19 00 02 00  C.^..4].(.......
0000000000e4fed8  88 34 5d e1 e8 fb a0 aa - 00 00 00 00 00 00 00 00  .4].............
0000000000e4fee8  00 00 00 00 e0 59 31 82 - ff ff ff ff 40 35 7d f8  .....Y1.....@5}.
0000000000e4fef8  00 00 00 00 cc b2 6b 80 - 00 00 00 00 30 fc a0 aa  ......k.....0...
0000000000e4ff08  00 00 00 00 e3 b2 6b 80 - 08 00 00 00 46 02 00 00  ......k.....F...
0000000000e4ff18  ae d7 4f 80 b8 57 ea 81 - 48 57 ea 81 e4 58 ea 81  ..O..W..HW...X..
0000000000e4ff28  e8 64 4f 80 b4 58 ea 81 - 48 57 ea 81 1f c5 61 80  .dO..X..HW....a.
0000000000e4ff38  10 a4 f0 81 48 57 ea 81 - 2f 16 00 78 60 ff e4 00  ....HW../..x`...
0000000000e4ff48  4a 16 00 78 28 dd 09 00 - c8 81 0a 00 f8 8a 0a 00  J..x(...........
0000000000e4ff58  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0x6b4 <----*

eax=771e7eef ebx=00007530 ecx=00ddef80 edx=00000000 esi=00000000 edi=00e8ff60
eip=7ffe0304 esp=00e8ff20 ebp=00e8ff78 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00e8ff1c 77f5b7f4 77e7a37a 00000000 00e8ff44 *SharedUserSystemCall+0xc (FPO: [0,0,0])
00e8ff78 77e61bf5 0000ea60 00000000 771c15f8 ntdll!ZwDelayExecution+0xc
00000000 00000000 00000000 00000000 00000000 kernel32!Sleep+0xb

*----> Raw Stack Dump <----*
0000000000e8ff20  f4 b7 f5 77 7a a3 e7 77 - 00 00 00 00 44 ff e8 00  ...wz..w....D...
0000000000e8ff30  a2 a5 e7 77 88 e1 2b 77 - 30 75 00 00 b9 7c 1e 77  ...w..+w0u...|.w
0000000000e8ff40  44 ff e8 00 00 ba 3c dc - ff ff ff ff 14 00 00 00  D.....<.........
0000000000e8ff50  01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00  ................
0000000000e8ff60  30 ff e8 00 28 ff e8 00 - dc ff e8 00 09 48 e9 77  0...(........H.w
0000000000e8ff70  d0 3a e8 77 00 00 00 00 - 00 00 00 00 f5 1b e6 77  .:.w...........w
0000000000e8ff80  60 ea 00 00 00 00 00 00 - f8 15 1c 77 60 ea 00 00  `..........w`...
0000000000e8ff90  a8 b3 0a 00 aa 7e 1e 77 - 00 00 00 00 00 00 1b 77  .....~.w.......w
0000000000e8ffa0  a8 b3 0a 00 a8 b3 0a 00 - ec ff e8 00 09 7f 1e 77  ...............w
0000000000e8ffb0  78 01 08 00 78 01 08 00 - 3b d3 e7 77 a8 b3 0a 00  x...x...;..w....
0000000000e8ffc0  78 01 08 00 78 01 08 00 - a8 b3 0a 00 00 00 00 00  x...x...........
0000000000e8ffd0  00 b0 fd 7f c0 ff e8 00 - 07 00 00 00 ff ff ff ff  ................
0000000000e8ffe0  09 48 e9 77 b8 3d e8 77 - 00 00 00 00 00 00 00 00  .H.w.=.w........
0000000000e8fff0  00 00 00 00 ef 7e 1e 77 - a8 b3 0a 00 00 00 00 00  .....~.w........
0000000000e90000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e90010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e90020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e90030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e90040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e90050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x6fc <----*

eax=00000000 ebx=0272e0f8 ecx=0009d9e0 edx=00000000 esi=000a0002 edi=00000000
eip=7ffe0304 esp=00ecfe28 ebp=00ecff90 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00ecfe24 77f5c084 780016a4 00000148 00ecff80 *SharedUserSystemCall+0xc (FPO: [0,0,0])
00ecff90 78001601 780019d4 0009de70 00000000 ntdll!NtReplyWaitReceivePortEx+0xc
000a67c8 ffffffff 0000019c 000001c0 00000000 RPCRT4+0x1601
00000000 00000000 00000000 00000000 00000000 0xffffffff

*----> Raw Stack Dump <----*
0000000000ecfe28  84 c0 f5 77 a4 16 00 78 - 48 01 00 00 80 ff ec 00  ...w...xH.......
0000000000ecfe38  00 00 00 00 f8 e0 72 02 - 58 ff ec 00 00 00 00 00  ......r.X.......
0000000000ecfe48  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfe58  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfe68  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfe78  00 00 00 00 55 00 00 00 - 00 00 00 00 00 00 00 00  ....U...........
0000000000ecfe88  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfe98  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfea8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfeb8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfec8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfed8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfee8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecfef8  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecff08  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ecff18  00 00 00 00 38 35 7d f8 - e4 45 53 80 00 d6 ee 81  ....85}..ES.....
0000000000ecff28  24 66 4f 80 cc d7 ee 81 - 60 d6 ee 81 1f c5 61 80  $fO.....`.....a.
0000000000ecff38  10 a4 f0 81 60 d6 ee 81 - 2f 16 00 78 60 ff ec 00  ....`.../..x`...
0000000000ecff48  4a 16 00 78 28 dd 09 00 - 40 c4 0b 00 c8 67 0a 00  J..x(...@....g..
0000000000ecff58  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0x5a0 <----*

eax=01ae0000 ebx=77d4546d ecx=00000016 edx=00000000 esi=0103f0f8 edi=00000000
eip=7ffe0304 esp=00faff18 ebp=00faff48 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00faff14 77d43c53 01001aa2 00000000 0103f0f8 *SharedUserSystemCall+0xc (FPO: [0,0,0])
00faff48 01011be7 00000000 631bc487 0103f0f8 USER32!WaitMessage+0xc
00faffb4 77e7d33b 00000000 00000000 00000004 Explorer+0x11be7
00faffec 00000000 631bc3f5 0006fed8 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
0000000000faff18  53 3c d4 77 a2 1a 00 01 - 00 00 00 00 f8 f0 03 01  S<.w............
0000000000faff28  00 00 00 00 80 00 01 00 - 0f 00 00 00 00 00 00 00  ................
0000000000faff38  00 00 00 00 8b 11 05 00 - 20 03 00 00 54 02 00 00  ........ ...T...
0000000000faff48  b4 ff fa 00 e7 1b 01 01 - 00 00 00 00 87 c4 1b 63  ...............c
0000000000faff58  f8 f0 03 01 00 00 00 00 - 04 00 00 00 d8 fe 06 00  ................
0000000000faff68  c2 1b 01 01 5d 29 01 01 - 18 01 00 00 f8 f0 03 01  ....])..........
0000000000faff78  08 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000faff88  00 00 00 00 01 00 00 00 - 00 00 00 00 10 a4 f0 81  ................
0000000000faff98  5e cf 4f 80 00 00 00 00 - 00 00 00 00 00 00 00 00  ^.O.............
0000000000faffa8  00 00 00 00 a8 5c 35 aa - f4 bf f5 77 ec ff fa 00  .....\5....w....
0000000000faffb8  3b d3 e7 77 00 00 00 00 - 00 00 00 00 04 00 00 00  ;..w............
0000000000faffc8  d8 fe 06 00 07 00 00 00 - 00 a0 fd 7f c0 ff fa 00  ................
0000000000faffd8  07 00 00 00 ff ff ff ff - 09 48 e9 77 b8 3d e8 77  .........H.w.=.w
0000000000faffe8  00 00 00 00 00 00 00 00 - 00 00 00 00 f5 c3 1b 63  ...............c
0000000000fafff8  d8 fe 06 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000fb0008  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000fb0018  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000fb0028  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000fb0038  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000fb0048  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x5a4 <----*

eax=77f883de ebx=00000000 ecx=00000000 edx=00000000 esi=000a1690 edi=631a08d3
eip=7ffe0304 esp=00feff9c ebp=00feffb4 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00feff98 77f5b7f4 77f88423 00000001 00feffac *SharedUserSystemCall+0xc (FPO: [0,0,0])
00feffb4 77e7d33b 00000000 631a08d3 000a1690 ntdll!ZwDelayExecution+0xc
00feffec 00000000 77f883de 00000000 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
0000000000feff9c  f4 b7 f5 77 23 84 f8 77 - 01 00 00 00 ac ff fe 00  ...w#..w........
0000000000feffac  00 00 00 00 00 00 00 80 - ec ff fe 00 3b d3 e7 77  ............;..w
0000000000feffbc  00 00 00 00 d3 08 1a 63 - 90 16 0a 00 00 00 00 00  .......c........
0000000000feffcc  00 00 00 00 00 90 fd 7f - c0 ff fe 00 07 00 00 00  ................
0000000000feffdc  ff ff ff ff 09 48 e9 77 - b8 3d e8 77 00 00 00 00  .....H.w.=.w....
0000000000feffec  00 00 00 00 00 00 00 00 - de 83 f8 77 00 00 00 00  ...........w....
0000000000fefffc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff000c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff001c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff002c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff003c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff004c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff005c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff006c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff007c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff008c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff009c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff00ac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff00bc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000ff00cc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x570 <----*

eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000001
eip=7ffe0304 esp=0117fcec ebp=0117ffb4 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0117fce8 77f5c524 77f91f83 00000003 0117fd30 *SharedUserSystemCall+0xc (FPO: [0,0,0])
0117ffb4 77e7d33b 00000000 00000020 00000020 ntdll!NtWaitForMultipleObjects+0xc
0117ffec 00000000 77f91e38 00000000 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
000000000117fcec  24 c5 f5 77 83 1f f9 77 - 03 00 00 00 30 fd 17 01  $..w...w....0...
000000000117fcfc  01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00  ............ ...
000000000117fd0c  20 00 00 00 00 00 00 00 - 20 5a fc 77 20 5a fc 77   ....... Z.w Z.w
000000000117fd1c  04 02 00 00 70 05 00 00 - 03 00 00 00 03 00 00 00  ....p...........
000000000117fd2c  02 00 00 00 00 02 00 00 - e4 01 00 00 38 04 00 00  ............8...
000000000117fd3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fd4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fd5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fd6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fd7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fd8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fd9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fdac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fdbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fdcc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fddc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fdec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fdfc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fe0c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000117fe1c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x5b4 <----*

eax=011bfe50 ebx=0011a7b0 ecx=011bfe2c edx=00000000 esi=00000000 edi=7ffdf000
eip=7ffe0304 esp=011bfd30 ebp=011bfdcc iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
011bfd2c 77f5c524 77e75ee0 0000000b 0011a7b0 *SharedUserSystemCall+0xc (FPO: [0,0,0])
011bfdcc 77d463eb 0000000b 00154650 00000000 ntdll!NtWaitForMultipleObjects+0xc
011bfe28 7746bf4b 0000000a 011bfe50 ffffffff USER32!SetScrollInfo+0x21f
011bff4c 7746cc79 631bc487 00000000 77f944cb SHELL32!Ordinal643+0x9a2
011bffb4 77e7d33b 00000000 77f944cb 000b5bd8 SHELL32!Ordinal643+0x16d0
011bffec 00000000 631bc3f5 00faf630 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
00000000011bfd30  24 c5 f5 77 e0 5e e7 77 - 0b 00 00 00 b0 a7 11 00  $..w.^.w........
00000000011bfd40  01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000011bfd50  0b 00 00 00 02 00 00 00 - 00 45 d4 77 25 45 d4 77  .........E.w%E.w
00000000011bfd60  00 00 00 00 00 00 00 00 - 14 05 00 00 0b 00 00 00  ................
00000000011bfd70  00 f0 fd 7f 00 60 fd 7f - 00 00 00 00 c8 fd 1b 01  .....`..........
00000000011bfd80  f0 88 fa 77 78 1c f5 77 - ff ff ff ff 3a 8a f5 77  ...wx..w....:..w
00000000011bfd90  d4 a6 e7 77 00 00 08 00 - b0 a7 11 00 00 60 fd 7f  ...w.........`..
00000000011bfda0  14 00 00 00 01 00 00 00 - c8 1b 0b 00 00 00 00 00  ................
00000000011bfdb0  00 00 00 00 4c fd 1b 01 - 00 00 00 00 dc ff 1b 01  ....L...........
00000000011bfdc0  09 48 e9 77 78 32 e8 77 - 00 00 00 00 28 fe 1b 01  .H.wx2.w....(...
00000000011bfdd0  eb 63 d4 77 0b 00 00 00 - 50 46 15 00 00 00 00 00  .c.w....PF......
00000000011bfde0  ff ff ff ff 01 00 00 00 - 68 59 0b 00 0a 00 00 00  ........hY......
00000000011bfdf0  00 00 00 00 f1 3e d4 77 - 00 00 00 00 3c fe 1b 01  .....>.w....<...
00000000011bfe00  ac ae 46 77 20 fe 1b 01 - 00 00 00 00 00 00 00 00  ..Fw ...........
00000000011bfe10  00 00 00 00 01 00 00 00 - 00 00 00 00 01 00 00 00  ................
00000000011bfe20  00 60 fd 7f 18 02 00 00 - 4c ff 1b 01 4b bf 46 77  .`......L...K.Fw
00000000011bfe30  0a 00 00 00 50 fe 1b 01 - ff ff ff ff ff 04 00 00  ....P...........
00000000011bfe40  50 46 15 00 00 00 00 00 - 00 00 00 00 00 00 00 00  PF..............
00000000011bfe50  18 01 00 00 d4 03 00 00 - 74 04 00 00 48 04 00 00  ........t...H...
00000000011bfe60  e8 02 00 00 e0 02 00 00 - d8 02 00 00 1c 02 00 00  ................

*----> State Dump for Thread Id 0x854 <----*

eax=00000000 ebx=00004e20 ecx=77d9c064 edx=00000000 esi=016bfd6c edi=77d43c54
eip=7ffe0304 esp=016bfcfc ebp=016bfd18 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\System32\stobject.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
016bfcf8 77d43a09 77d43c7d 016bfd6c 00000000 *SharedUserSystemCall+0xc (FPO: [0,0,0])
016bfd18 74b01590 016bfd6c 00000000 00000000 USER32+0x3a09
016bfd90 74b02f1b 74b00000 00000000 0001017e stobject+0x1590
016bffb4 77e7d33b 00000000 00000000 00000000 stobject+0x2f1b
016bffec 00000000 74b02ed6 00000000 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
00000000016bfcfc  09 3a d4 77 7d 3c d4 77 - 6c fd 6b 01 00 00 00 00  .:.w}<.wl.k.....
00000000016bfd0c  00 00 00 00 00 00 00 00 - 00 00 00 00 90 fd 6b 01  ..............k.
00000000016bfd1c  90 15 b0 74 6c fd 6b 01 - 00 00 00 00 00 00 00 00  ...tl.k.........
00000000016bfd2c  00 00 00 00 00 00 00 00 - 00 00 b0 74 00 00 00 00  ...........t....
00000000016bfd3c  30 00 00 00 00 40 00 00 - f0 12 b0 74 00 00 00 00  0....@.....t....
00000000016bfd4c  1e 00 00 00 00 00 b0 74 - 71 00 05 00 11 00 01 00  .......tq.......
00000000016bfd5c  10 00 00 00 00 00 00 00 - f4 31 b0 74 00 00 00 00  .........1.t....
00000000016bfd6c  7e 01 01 00 9f c1 00 00 - 49 00 30 00 01 00 00 00  ~.......I.0.....
00000000016bfd7c  3f da 04 00 ea 02 00 00 - c4 02 00 00 00 00 00 00  ?...............
00000000016bfd8c  00 00 00 00 b4 ff 6b 01 - 1b 2f b0 74 00 00 b0 74  ......k../.t...t
00000000016bfd9c  00 00 00 00 7e 01 01 00 - 01 00 00 00 00 00 00 00  ....~...........
00000000016bfdac  43 00 3a 00 5c 00 57 00 - 49 00 4e 00 44 00 4f 00  C.:.\.W.I.N.D.O.
00000000016bfdbc  57 00 53 00 5c 00 53 00 - 79 00 73 00 74 00 65 00  W.S.\.S.y.s.t.e.
00000000016bfdcc  6d 00 33 00 32 00 5c 00 - 73 00 74 00 6f 00 62 00  m.3.2.\.s.t.o.b.
00000000016bfddc  6a 00 65 00 63 00 74 00 - 2e 00 64 00 6c 00 6c 00  j.e.c.t...d.l.l.
00000000016bfdec  00 00 00 00 00 02 00 00 - fc ff 6b 01 23 00 00 00  ..........k.#...
00000000016bfdfc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000016bfe0c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000016bfe1c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000016bfe2c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x86c <----*

eax=72d22ecc ebx=0184ff1c ecx=00000136 edx=00000000 esi=00000000 edi=7ffdf000
eip=7ffe0304 esp=0184fed4 ebp=0184ff70 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0184fed0 77f5c524 77e75ee0 00000002 0184ff1c *SharedUserSystemCall+0xc (FPO: [0,0,0])
0184ff70 77e75faa 00000002 0184ffa4 00000000 ntdll!NtWaitForMultipleObjects+0xc
0184ffb4 77e7d33b 00000000 00000028 41f59037 kernel32!WaitForMultipleObjects+0x17
0184ffec 00000000 72d22ecc 00000000 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
000000000184fed4  24 c5 f5 77 e0 5e e7 77 - 02 00 00 00 1c ff 84 01  $..w.^.w........
000000000184fee4  01 00 00 00 00 00 00 00 - 00 00 00 00 28 00 00 00  ............(...
000000000184fef4  00 00 00 00 00 00 00 00 - ff ff ff ff 46 02 00 00  ............F...
000000000184ff04  00 00 00 00 30 5c ea a9 - 50 96 ef 81 02 00 00 00  ....0\..P.......
000000000184ff14  00 f0 fd 7f 00 f0 fa 7f - 20 04 00 00 f8 03 00 00  ........ .......
000000000184ff24  ec 97 ef 81 e8 64 4f 80 - bc 97 ef 81 50 96 ef 81  .....dO.....P...
000000000184ff34  1f c5 61 80 10 a4 f0 81 - 1c ff 84 01 00 f0 fa 7f  ..a.............
000000000184ff44  14 00 00 00 01 00 00 00 - 80 e1 11 00 00 00 00 00  ................
000000000184ff54  00 00 00 00 f0 fe 84 01 - 00 00 00 00 dc ff 84 01  ................
000000000184ff64  09 48 e9 77 78 32 e8 77 - 00 00 00 00 b4 ff 84 01  .H.wx2.w........
000000000184ff74  aa 5f e7 77 02 00 00 00 - a4 ff 84 01 00 00 00 00  ._.w............
000000000184ff84  ff ff ff ff 00 00 00 00 - 0c 2f d2 72 02 00 00 00  ........./.r....
000000000184ff94  a4 ff 84 01 00 00 00 00 - ff ff ff ff 37 90 f5 41  ............7..A
000000000184ffa4  20 04 00 00 f8 03 00 00 - a8 5c ea a9 f4 bf f5 77   ........\.....w
000000000184ffb4  ec ff 84 01 3b d3 e7 77 - 00 00 00 00 28 00 00 00  ....;..w....(...
000000000184ffc4  37 90 f5 41 00 00 00 00 - 00 00 00 00 00 f0 fa 7f  7..A............
000000000184ffd4  c0 ff 84 01 07 00 00 00 - ff ff ff ff 09 48 e9 77  .............H.w
000000000184ffe4  b8 3d e8 77 00 00 00 00 - 00 00 00 00 00 00 00 00  .=.w............
000000000184fff4  cc 2e d2 72 00 00 00 00 - 00 00 00 00 00 00 00 00  ...r............
0000000001850004  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x8a8 <----*

eax=77e83048 ebx=00000470 ecx=77f69d95 edx=00000000 esi=01a4ff98 edi=77d44377
eip=7ffe0304 esp=01a4ff54 ebp=01a4ff78 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\System32\WINMM.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01a4ff50 77d43a09 77d443b5 01a4ff98 00000000 *SharedUserSystemCall+0xc (FPO: [0,0,0])
01a4ff78 76b41c79 01a4ff98 00000000 00000000 USER32+0x3a09
01a4ffb4 77e7d33b 00000470 00010003 00080000 WINMM!timeGetTime+0x1a1
01a4ffec 00000000 76b41c14 00000470 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
0000000001a4ff54  09 3a d4 77 b5 43 d4 77 - 98 ff a4 01 00 00 00 00  .:.w.C.w........
0000000001a4ff64  00 00 00 00 00 00 00 00 - 70 04 00 00 77 43 d4 77  ........p...wC.w
0000000001a4ff74  00 00 00 00 b4 ff a4 01 - 79 1c b4 76 98 ff a4 01  ........y..v....
0000000001a4ff84  00 00 00 00 00 00 00 00 - 00 00 00 00 03 00 01 00  ................
0000000001a4ff94  00 00 08 00 94 01 01 00 - 9f c1 00 00 49 00 30 00  ............I.0.
0000000001a4ffa4  01 00 00 00 3f da 04 00 - ea 02 00 00 c4 02 00 00  ....?...........
0000000001a4ffb4  ec ff a4 01 3b d3 e7 77 - 70 04 00 00 03 00 01 00  ....;..wp.......
0000000001a4ffc4  00 00 08 00 70 04 00 00 - 1f 00 00 00 00 c0 fa 7f  ....p...........
0000000001a4ffd4  c0 ff a4 01 07 00 00 00 - ff ff ff ff 09 48 e9 77  .............H.w
0000000001a4ffe4  b8 3d e8 77 00 00 00 00 - 00 00 00 00 00 00 00 00  .=.w............
0000000001a4fff4  14 1c b4 76 70 04 00 00 - 00 00 00 00 00 00 00 00  ...vp...........
0000000001a50004  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a50014  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a50024  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a50034  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a50044  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a50054  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a50064  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a50074  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a50084  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xbf8 <----*

eax=00000000 ebx=000adb48 ecx=000cc7d0 edx=00000000 esi=000a0002 edi=00000000
eip=7ffe0304 esp=01aafe28 ebp=01aaff90 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01aafe24 77f5c084 780016a4 00000148 01aaff80 *SharedUserSystemCall+0xc (FPO: [0,0,0])
01aaff90 78001601 780019d4 0009de70 00e4fd6c ntdll!NtReplyWaitReceivePortEx+0xc
00157200 ffffffff 00000558 000004e0 00000000 RPCRT4+0x1601
00000000 00000000 00000000 00000000 00000000 0xffffffff

*----> Raw Stack Dump <----*
0000000001aafe28  84 c0 f5 77 a4 16 00 78 - 48 01 00 00 80 ff aa 01  ...w...xH.......
0000000001aafe38  00 00 00 00 48 db 0a 00 - 58 ff aa 01 00 00 04 00  ....H...X.......
0000000001aafe48  10 a4 f0 81 70 fc 29 82 - 00 00 00 00 10 a4 f0 01  ....p.).........
0000000001aafe58  00 3b a2 aa 48 43 00 00 - c0 5e 0b 81 00 00 00 00  .;..HC...^......
0000000001aafe68  9c 36 50 c0 9c 36 50 c0 - 08 a6 f0 81 5a 12 00 00  .6P..6P.....Z...
0000000001aafe78  de 6a 51 80 40 35 7d f8 - 02 00 00 00 08 69 4f 80  .jQ.@5}......iO.
0000000001aafe88  00 60 fd 7f b8 3b a2 aa - 00 00 00 00 98 3b a2 aa  .`...;.......;..
0000000001aafe98  2d 68 51 80 00 50 fd 7f - 01 00 00 00 00 00 00 00  -hQ..P..........
0000000001aafea8  54 ff 1f c0 00 00 00 00 - fc 07 30 c0 e4 3b a2 aa  T.........0..;..
0000000001aafeb8  a2 6e 51 80 b8 3b a2 aa - 00 00 00 00 00 00 00 00  .nQ..;..........
0000000001aafec8  b0 d9 bc 81 10 a4 f0 81 - 01 a4 f0 81 00 00 00 00  ................
0000000001aafed8  54 ff 1f c0 10 a4 f0 81 - 00 00 00 00 00 00 a7 01  T...............
0000000001aafee8  ff ff a6 01 00 00 00 00 - 00 00 a7 01 00 00 00 00  ................
0000000001aafef8  10 a4 f0 81 64 3b a2 aa - 00 00 00 00 ff ff ff ff  ....d;..........
0000000001aaff08  b0 97 52 80 f8 6d 4d 80 - bd 2c 4c f8 07 e8 00 00  ..R..mM..,L.....
0000000001aaff18  6c 03 38 82 e8 00 38 82 - 68 03 38 82 30 9c 4c f8  l.8...8.h.8.0.L.
0000000001aaff28  6c 03 38 82 c0 29 35 82 - 1a 8b 4c f8 90 21 35 82  l.8..)5...L..!5.
0000000001aaff38  6c 03 38 82 2c 0f 6c 80 - 2f 16 00 78 60 ff aa 01  l.8.,.l./..x`...
0000000001aaff48  4a 16 00 78 28 dd 09 00 - 10 4b 16 00 00 72 15 00  J..x(....K...r..
0000000001aaff58  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0xc24 <----*

eax=00000000 ebx=00000000 ecx=01b60000 edx=00000000 esi=775b05a0 edi=00000000
eip=7ffe0304 esp=01d2fe44 ebp=01d2fecc iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01d2fe40 77f5c534 77f69f68 000003b8 00000000 *SharedUserSystemCall+0xc (FPO: [0,0,0])
01d2fecc 77f5b2e6 005b05a0 774e5481 775b05a0 ntdll!NtWaitForSingleObject+0xc
00000000 00000000 00000000 00000000 00000000 ntdll!RtlEnterCriticalSection+0x46

*----> Raw Stack Dump <----*
0000000001d2fe44  34 c5 f5 77 68 9f f6 77 - b8 03 00 00 00 00 00 00  4..wh..w........
0000000001d2fe54  00 00 00 00 e8 e0 17 00 - 00 00 00 00 a0 05 5b 77  ..............[w
0000000001d2fe64  00 00 00 00 03 00 00 00 - 00 b0 fa 7f c8 fe d2 01  ................
0000000001d2fe74  1b a3 e7 77 9c fe d2 01 - 9c a3 e7 77 51 54 4e 77  ...w.......wQTNw
0000000001d2fe84  00 00 00 00 e8 e0 17 00 - 00 00 00 00 94 fe d2 01  ................
0000000001d2fe94  80 3c 36 fe ff ff ff ff - 14 00 00 00 01 00 00 00  .<6.............
0000000001d2fea4  24 ff d2 01 00 00 00 00 - 00 00 00 00 80 fe d2 01  $...............
0000000001d2feb4  00 00 00 00 38 ff d2 01 - 09 48 e9 77 d0 3a e8 77  ....8....H.w.:.w
0000000001d2fec4  00 00 00 00 b8 03 00 00 - 00 00 00 00 e6 b2 f5 77  ...............w
0000000001d2fed4  a0 05 5b 00 81 54 4e 77 - a0 05 5b 77 51 54 4e 77  ..[..TNw..[wQTNw
0000000001d2fee4  00 00 00 00 48 ff d2 01 - e8 e0 17 00 2e a7 1c 63  ....H..........c
0000000001d2fef4  e8 e0 17 00 d0 48 14 00 - 15 a7 1c 63 00 00 00 00  .....H.....c....
0000000001d2ff04  e2 6a f9 77 d0 48 14 00 - fc 59 fc 77 e8 c7 0a 00  .j.w.H...Y.w....
0000000001d2ff14  00 00 00 00 03 00 00 00 - 14 00 00 00 01 00 00 00  ................
0000000001d2ff24  00 00 00 00 30 3d 08 00 - 00 00 00 00 0c ff d2 01  ....0=..........
0000000001d2ff34  90 fe d2 01 dc ff d2 01 - f0 88 fa 77 00 39 f5 77  ...........w.9.w
0000000001d2ff44  00 00 00 00 b4 ff d2 01 - 3d 61 f9 77 15 a7 1c 63  ........=a.w...c
0000000001d2ff54  d0 48 14 00 30 3d 08 00 - 00 00 00 00 fc 59 fc 77  .H..0=.......Y.w
0000000001d2ff64  a0 59 fc 77 6e 6a f9 77 - 00 00 00 00 d0 48 14 00  .Y.wnj.w.....H..
0000000001d2ff74  e8 c7 0a 00 8b 5b f9 77 - 26 61 f9 77 00 00 00 00  .....[.w&a.w....

*----> State Dump for Thread Id 0xccc <----*

eax=00000000 ebx=00000000 ecx=0013b37c edx=000cd2d8 esi=7ffa0000 edi=001748d8
eip=774e5688 esp=01b9fd00 ebp=01b9ff30 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: SHELL32!Ordinal259
        774e5670 8cf3             mov     ebx,
        774e5672 0000             add     [eax],al
        774e5674 0039             add     [ecx],bh
        774e5676 5d               pop     ebp
        774e5677 080f             or      [edi],cl
        774e5679 85e2             test    edx,esp
        774e567b 0000             add     [eax],al
        774e567d 008b45fc56ff     add     [ebx-0xa903bb],cl
        774e5683 701c             jo      SHELL32!Ordinal259+0x4790c (774e56a1)
        774e5685 8b45f8           mov     eax,[ebp-0x8]
FAULT ->774e5688 ff701c           push dword ptr [eax+0x1c] ds:0023:0000001c=????????
        774e568b ff1560153d77   call dword ptr [SHELL32!Ordinal532+0x1560 (773d1560)]
        774e5691 8bf0             mov     esi,eax
        774e5693 f7de             neg     esi
        774e5695 1bf6             sbb     esi,esi
        774e5697 f7de             neg     esi
        774e5699 3bfb             cmp     edi,ebx
        774e569b 0f84b2000000     je      SHELL32!Ordinal259+0x479be (774e5753)
        774e56a1 8b07             mov     eax,[edi]
        774e56a3 3bc3             cmp     eax,ebx
        774e56a5 8945e8           mov     [ebp-0x18],eax

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\SHLWAPI.dll -
ChildEBP RetAddr  Args to Child              
01b9ff30 774e5a91 00000000 7ffa0008 00000020 SHELL32!Ordinal259+0x478f3
01b9ff50 631bc487 7ffa0000 00000000 00000000 SHELL32!Ordinal259+0x47cfc
01b9ffb4 77e7d33b 00000000 00000000 00000000 SHLWAPI!Ordinal549+0x156
01b9ffec 00000000 631bc3f5 011bf9cc 00000000 kernel32!RegisterWaitForInputIdle+0x43

*----> Raw Stack Dump <----*
0000000001b9fd00  00 98 11 00 00 00 fa 7f - a0 05 5b 77 01 00 00 00  ..........[w....
0000000001b9fd10  f0 88 fa 77 48 14 f5 77 - ff ff ff ff 1d 54 f5 77  ...wH..w.....T.w
0000000001b9fd20  44 b6 f5 77 8f 5d f7 77 - 30 fd b9 01 01 00 00 00  D..w.].w0.......
0000000001b9fd30  17 00 01 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001b9fd40  8c fe b9 01 b4 36 08 00 - b0 36 08 00 10 00 00 00  .....6...6......
0000000001b9fd50  6a bb 00 78 cc 36 08 00 - 73 bb 00 78 b4 36 08 00  j..x.6..s..x.6..
0000000001b9fd60  01 00 00 00 c8 fe b9 01 - 00 00 00 00 0d bb 00 78  ...............x
0000000001b9fd70  28 33 08 00 03 00 00 00 - 10 00 00 00 c8 fe b9 01  (3..............
0000000001b9fd80  c8 fe b9 01 88 1a eb a9 - 2d 68 51 80 00 f0 92 01  ........-hQ.....
0000000001b9fd90  01 00 00 00 00 00 00 00 - bc 64 00 c0 00 00 00 00  .........d......
0000000001b9fda0  18 00 30 c0 d4 1a eb a9 - a2 6e 51 80 a8 1a eb a9  ..0......nQ.....
0000000001b9fdb0  00 00 00 00 00 00 00 00 - ff ff 92 01 00 00 00 00  ................
0000000001b9fdc0  38 00 00 00 23 00 00 00 - 23 00 00 00 00 00 00 00  8...#...#.......
0000000001b9fdd0  00 00 00 00 cc f9 1b 01 - 00 00 00 00 00 00 1b 01  ................
0000000001b9fde0  f5 c3 1b 63 78 35 0c 00 - 42 d3 e7 77 1b 00 00 00  ...cx5..B..w....
0000000001b9fdf0  00 02 00 00 fc ff b9 01 - 23 00 00 00 f4 1a eb a9  ........#.......
0000000001b9fe00  68 e8 06 00 00 f0 92 01 - e0 e1 d7 81 68 f5 df ff  h...........h...
0000000001b9fe10  01 00 d7 81 af 88 53 80 - 90 25 1d 82 e8 e1 d7 81  ......S..%......
0000000001b9fe20  01 00 00 00 d5 ef 59 80 - 40 00 00 00 01 0e e0 81  ......Y.@.......
0000000001b9fe30  05 00 00 00 07 00 00 00 - 54 1b eb a9 04 00 00 00  ........T.......

*----> State Dump for Thread Id 0xcdc <----*

eax=00150380 ebx=00000000 ecx=773ee2dc edx=a9ed5d64 esi=775b05a0 edi=00000000
eip=7ffe0304 esp=01d6dc88 ebp=01d6dd10 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: <nosymbols>
        7ffe02f2 0000             add     [eax],al
        7ffe02f4 0000             add     [eax],al
        7ffe02f6 0000             add     [eax],al
        *SharedUserSystemCall:
        7ffe02f8 0000             add     [eax],al
        7ffe02fa 0000             add     [eax],al
        7ffe02fc 0000             add     [eax],al
        7ffe02fe 0000             add     [eax],al
        7ffe0300 8bd4             mov     edx,esp
        7ffe0302 0f34             sysenter
        7ffe0304 c3               ret
        7ffe0305 9c               pushfd
        7ffe0306 810c2400010000   or      dword ptr [esp],0x100
        7ffe030d 9d               popfd
        7ffe030e c3               ret
        7ffe030f 8bd4             mov     edx,esp
        7ffe0311 0f05             syscall
        7ffe0313 c3               ret
        7ffe0314 9c               pushfd
        7ffe0315 810c2400010000   or      dword ptr [esp],0x100
        7ffe031c 9d               popfd

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01d6dc84 77f5c534 77f69f68 000003b8 00000000 *SharedUserSystemCall+0xc (FPO: [0,0,0])
01d6dd10 77f5b2e6 005b05a0 774db0ce 775b05a0 ntdll!NtWaitForSingleObject+0xc
775b05a0 00000002 00000001 00000ccc 000003b8 ntdll!RtlEnterCriticalSection+0x46

*----> Raw Stack Dump <----*
0000000001d6dc88  34 c5 f5 77 68 9f f6 77 - b8 03 00 00 00 00 00 00  4..wh..w........
0000000001d6dc98  00 00 00 00 00 00 00 00 - 01 00 00 00 00 00 00 00  ................
0000000001d6dca8  06 00 00 00 30 00 00 00 - 01 8b 1c 63 58 69 0b 00  ....0......cXi..
0000000001d6dcb8  00 40 fd 7f 00 00 00 00 - 5f a6 e7 00 10 ab 17 00  .@......_.......
0000000001d6dcc8  00 00 08 00 c0 da d6 01 - 74 dd d6 01 20 dd d6 01  ........t... ...
0000000001d6dcd8  f0 88 fa 77 78 1c f5 77 - ff ff ff ff 3a 8a f5 77  ...wx..w....:..w
0000000001d6dce8  d4 a6 e7 77 00 00 08 00 - 08 00 14 00 e5 a6 e7 77  ...w...........w
0000000001d6dcf8  00 00 00 00 48 70 0b 00 - 70 c8 14 00 70 c8 14 00  ....Hp..p...p...
0000000001d6dd08  00 00 00 00 b8 03 00 00 - a0 05 5b 77 e6 b2 f5 77  ..........[w...w
0000000001d6dd18  a0 05 5b 00 ce b0 4d 77 - a0 05 5b 77 70 c8 14 00  ..[...Mw..[wp...
0000000001d6dd28  10 ab 17 00 80 dd d6 01 - 70 c8 14 00 69 34 4d 77  ........p...i4Mw
0000000001d6dd38  48 70 0b 00 b2 34 4d 77 - 58 69 0b 00 60 00 00 00  Hp...4MwXi..`...
0000000001d6dd48  70 c8 14 00 48 70 0b 00 - d6 35 4d 77 58 69 0b 00  p...Hp...5MwXi..
0000000001d6dd58  60 00 00 00 94 dd d6 01 - 17 0b 48 77 68 69 0b 00  `.........Hwhi..
0000000001d6dd68  42 02 0a 00 60 00 00 00 - 94 dd d6 01 70 c8 14 00  B...`.......p...
0000000001d6dd78  58 c8 14 00 40 38 3e 77 - b4 dd d6 01 77 12 4f 77  X...@8>w....w.Ow
0000000001d6dd88  48 70 0b 00 42 02 0a 00 - 60 00 00 00 70 c8 14 00  Hp..B...`...p...
0000000001d6dd98  10 bd 72 02 24 de d6 01 - 00 00 00 00 56 00 00 00  ..r.$.......V...
0000000001d6dda8  b8 03 00 00 a8 07 05 00 - b8 0b 00 00 08 de d6 01  ................
0000000001d6ddb8  26 93 45 77 42 02 0a 00 - 04 00 00 00 70 57 17 00  &.EwB.......pW..



Application exception occurred:
        App: C:\Program Files\Internet Explorer\iexplore.exe (pid=3100)
        When: 10/21/2004 @ 01:29:23.578
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: DAKAHRABAH
        User Name: Owner
        Terminal Session Id: 0
        Number of Processors: 2
        Processor Type: x86 Family 15 Model 3 Stepping 4
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 2
        Current Type: Multiprocessor Free
        Registered Organization:
        Registered Owner:  

*----> Task List <----*
   0 System Process
   4 System
 592 smss.exe
 648 csrss.exe
 672 winlogon.exe
 716 services.exe
 728 lsass.exe
 896 svchost.exe
 964 svchost.exe
1060 svchost.exe
1164 svchost.exe
1224 svchost.exe
1440 spoolsv.exe
1772 ccApp.exe
1800 WkUFind.exe
1820 winampa.exe
1848 msnmsgr.exe
2044 ccSetMgr.exe
 180 navapsvc.exe
 520 svchost.exe
 580 ccEvtMgr.exe
2248 alg.exe
1868 wuauclt.exe
 508 btdownloadgui.exe
3968 btdownloadgui.exe
3140 iexplore.exe
1504 iexplore.exe
3856 explorer.exe
2616 iexplore.exe
3512 realsched.exe
3268 winamp.exe
3392 msmsgs.exe
3100 iexplore.exe
2088 drwtsn32.exe

*----> Module List <----*
(0000000000400000 - 0000000000419000: C:\Program Files\Internet Explorer\iexplore.exe
(0000000001af0000 - 0000000001c30000: C:\Program Files\SolidDocuments\SolidConverterPDF\SCPDF\ConverterCore.dll
(0000000001c30000 - 0000000001ceb000: C:\Program Files\SolidDocuments\SolidConverterPDF\SCPDF\SolidCore.dll
(0000000001cf0000 - 0000000001df7000: C:\Program Files\SolidDocuments\SolidConverterPDF\SCPDF\MFC71LU.DLL
(0000000001f30000 - 0000000001f3b000: C:\Program Files\Adobe\Acrobat 6.0\Reader\ActiveX\AcroIEHelper.dll
(0000000001f40000 - 0000000001f58000: C:\Program Files\Norton AntiVirus\NavShExt.dll
(0000000001f70000 - 0000000002235000: C:\WINDOWS\system32\xpsp2res.dll
(0000000002960000 - 00000000029e8000: C:\WINDOWS\system32\shdoclc.dll
(0000000003000000 - 000000000301e000: C:\Program Files\Common Files\Symantec Shared\Script Blocking\scrauth.dll
(0000000003020000 - 0000000003040000: C:\Program Files\Common Files\Symantec Shared\Script Blocking\ScrBlock.dll
(0000000004360000 - 00000000043b6000: C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\MSVCR71.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 0000000010035000: C:\Program Files\SolidDocuments\SolidConverterPDF\SCPDF\ExploreExtPDF.dll
(0000000020000000 - 0000000020012000: C:\WINDOWS\system32\browselc.dll
(0000000032520000 - 0000000032532000: C:\Program Files\Microsoft Office\Office10\msohev.dll
(000000004d4f0000 - 000000004d548000: C:\WINDOWS\system32\WINHTTP.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl32.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\system32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\wsock32.dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxprxy.dll
(00000000722b0000 - 00000000722b5000: C:\WINDOWS\system32\sensapi.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(00000000746c0000 - 00000000746e7000: C:\WINDOWS\System32\msls31.dll
(00000000746f0000 - 000000007471a000: C:\WINDOWS\System32\msimtf.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\System32\MSCTF.dll
(0000000074980000 - 0000000074ab0000: C:\WINDOWS\System32\msxml3.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(0000000075c50000 - 0000000075cbe000: c:\windows\system32\jscript.dll
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\MLANG.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000075f80000 - 000000007607c000: C:\WINDOWS\system32\BROWSEUI.dll
(0000000076200000 - 0000000076271000: C:\WINDOWS\System32\mshtmled.dll
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.DLL
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DLL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.DLL
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(0000000077260000 - 00000000772fe000: C:\WINDOWS\system32\urlmon.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll
(00000000774e0000 - 000000007761c000: C:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778cc000: C:\WINDOWS\system32\SHDOCVW.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(0000000079170000 - 0000000079196000: C:\WINDOWS\System32\mscoree.dll
(0000000079410000 - 0000000079425000: C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\mscorie.dll
(0000000079480000 - 0000000079498000: C:\WINDOWS\Microsoft.NET\Framework\v1.1.4322\mscorld.dll
(000000007c000000 - 000000007c054000: C:\WINDOWS\system32\MSVCR70.dll
(000000007c080000 - 000000007c0f7000: C:\WINDOWS\system32\MSVCP70.dll
(000000007c340000 - 000000007c398000: C:\Program Files\SolidDocuments\SolidConverterPDF\SCPDF\MSLUR71.dll
(000000007c3a0000 - 000000007c41d000: C:\Program Files\SolidDocuments\SolidConverterPDF\SCPDF\MSLUP71.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d4000: C:\WINDOWS\system32\SHELL32.dll
(000000007d1e0000 - 000000007d492000: C:\WINDOWS\system32\msi.dll
(000000007d4a0000 - 000000007d783000: C:\WINDOWS\System32\mshtml.dll

*----> State Dump for Thread Id 0x7e8 <----*

eax=00000000 ebx=00000000 ecx=0013bf88 edx=00000000 esi=00000000 edi=0013bf88
eip=7d4f204f esp=0013be74 ebp=0013be7c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\System32\mshtml.dll -
function: mshtml
        7d4f203f 90               nop
        7d4f2040 90               nop
        7d4f2041 8bff             mov     edi,edi
        7d4f2043 55               push    ebp
        7d4f2044 8bec             mov     ebp,esp
        7d4f2046 56               push    esi
        7d4f2047 8b7508           mov     esi,[ebp+0x8]
        7d4f204a 57               push    edi
        7d4f204b 8bf9             mov     edi,ecx
        7d4f204d 8937             mov     [edi],esi
FAULT ->7d4f204f 668b4656         mov     ax,[esi+0x56]         ds:0023:00000056=????
        7d4f2053 66894704         mov     [edi+0x4],ax
        7d4f2057 8b450c           mov     eax,[ebp+0xc]
        7d4f205a 83c801           or      eax,0x1
        7d4f205d 66094656         or      [esi+0x56],ax
        7d4f2061 8b4614           mov     eax,[esi+0x14]
        7d4f2064 8b08             mov     ecx,[eax]
        7d4f2066 50               push    eax
        7d4f2067 ff5104           call    dword ptr [ecx+0x4]
        7d4f206a 8b06             mov     eax,[esi]
        7d4f206c 56               push    esi

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0013be7c 7d4f20ca 00000000 00000000 0013bfa4 mshtml+0x5204f
0013be94 7d4f85c0 00000000 00000000 02567cd0 mshtml+0x520ca
0013bfb0 7d4f8588 00000000 00000000 00000000 mshtml+0x585c0
0013bfe4 7d5229de 00000000 00000402 800117b4 mshtml+0x58588
0013c054 7d516406 00000001 00000001 00000001 mshtml+0x829de
0013c0b4 7d54d0bc 0013c2c4 02566f90 0013c2c4 mshtml+0x76406
0013c10c 7d504599 0013c2c4 0013c1a8 02566f90 mshtml+0xad0bc
0013c124 7d503c9d 02566f90 0013c2c4 0013c2c4 mshtml+0x64599
025675c0 00000000 00000000 00000000 00000000 mshtml+0x63c9d

*----> Raw Stack Dump <----*
000000000013be74  88 bf 13 00 00 00 00 00 - 94 be 13 00 ca 20 4f 7d  ............. O}
000000000013be84  00 00 00 00 00 00 00 00 - a4 bf 13 00 00 00 00 00  ................
000000000013be94  b0 bf 13 00 c0 85 4f 7d - 00 00 00 00 00 00 00 00  ......O}........
000000000013bea4  d0 7c 56 02 d0 7c 56 02 - 00 00 00 00 07 3c 50 7d  .|V..|V......<P}
000000000013beb4  00 00 00 00 14 c0 13 00 - 16 3c 50 7d 30 00 00 00  .........<P}0...
000000000013bec4  f0 98 56 02 00 98 56 02 - 10 17 56 02 78 16 15 00  ..V...V...V.x...
000000000013bed4  6d 05 91 7c ff ff ff ff - ff ff ff ff 04 48 60 00  m..|.........H`.
000000000013bee4  00 00 00 00 02 00 00 80 - e0 45 76 77 58 46 76 77  .........EvwXFvw
000000000013bef4  00 bf 13 00 07 00 00 00 - 04 bf 13 00 20 00 00 00  ............ ...
000000000013bf04  00 b1 56 02 24 bf 13 00 - 81 15 50 7d 40 06 15 00  ..V.$.....P}@...
000000000013bf14  24 c2 13 00 00 00 00 00 - 70 d7 56 02 00 00 00 00  $.......p.V.....
000000000013bf24  44 c1 13 00 45 15 50 7d - 50 b8 1b 00 1d 00 00 00  D...E.P}P.......
000000000013bf34  70 d7 56 02 00 00 00 00 - 02 00 00 00 68 74 74 70  p.V.........http
000000000013bf44  3a 77 77 77 08 00 00 00 - 69 61 6c 68 08 b5 21 00  :www....ialh..!.
000000000013bf54  e0 fb 24 00 6d 03 00 00 - 00 c0 13 00 58 f9 24 00  ..$.m.......X.$.
000000000013bf64  e0 be 13 00 e0 cd 73 7d - 8c bf 13 00 08 00 00 00  ......s}........
000000000013bf74  08 00 00 00 90 12 57 02 - b0 01 15 00 00 00 00 00  ......W.........
000000000013bf84  ad 93 00 00 00 00 00 00 - 14 c0 13 00 c8 07 1c 00  ................
000000000013bf94  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000013bfa4  d0 7c 56 02 00 00 00 00 - 00 00 00 00 e4 bf 13 00  .|V.............

*----> State Dump for Thread Id 0xd24 <----*

eax=774f5cc8 ebx=00000000 ecx=7ffdd000 edx=776062b4 esi=001532f8 edi=00000100
eip=7c90eb94 esp=0233fe1c ebp=0233ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr  Args to Child              
0233ff80 77e76c22 0233ffa8 77e76a3b 001532f8 ntdll!KiFastSystemCallRet
0233ff88 77e76a3b 001532f8 00000000 0013d7e4 RPCRT4!I_RpcBCacheFree+0x5ea
0233ffa8 77e76c0a 00163bd0 0233ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0233ffb4 7c80b50b 0018f918 00000000 0013d7e4 RPCRT4!I_RpcBCacheFree+0x5d2
0233ffec 00000000 77e76bf0 0018f918 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000233fe1c  99 e3 90 7c 03 67 e7 77 - 84 02 00 00 70 ff 33 02  ...|.g.w....p.3.
000000000233fe2c  00 00 00 00 38 85 19 00 - 54 ff 33 02 00 23 fc 82  ....8...T.3..#..
000000000233fe3c  fa 22 55 80 00 00 10 00 - 20 a0 3d 82 80 cd dd 82  ."U..... .=.....
000000000233fe4c  40 80 00 c0 02 00 00 00 - 00 00 00 01 06 02 00 00  @...............
000000000233fe5c  c0 9e 4d 80 02 00 00 00 - 00 00 00 00 02 00 00 00  ..M.............
000000000233fe6c  1f 00 00 00 02 00 00 00 - 02 00 00 00 40 f5 df ff  ............@...
000000000233fe7c  02 ff 1f c0 46 89 4e 80 - 00 e0 fd 7f b0 fb c8 a9  ....F.N.........
000000000233fe8c  78 ff 1f c0 90 fb c8 a9 - 13 ae 4e 80 00 d0 fd 7f  x.........N.....
000000000233fe9c  01 00 00 00 43 3d 70 80 - 28 fc c8 a9 27 34 70 80  ....C=p.(...'4p.
000000000233feac  00 0d db ba 00 00 00 00 - 6a fc 4e 80 b0 fb c8 a9  ........j.N.....
000000000233febc  00 00 00 00 00 00 00 00 - 58 eb 81 82 20 a0 3d 82  ........X... .=.
000000000233fecc  01 a0 3d 82 00 00 00 00 - 74 ff 1f c0 00 00 00 00  ..=.....t.......
000000000233fedc  ea 00 f8 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000233feec  ec a0 3d 82 ff ff ff ff - 40 f5 df ff 00 00 00 00  ..=.....@.......
000000000233fefc  10 34 70 80 44 7f a9 82 - 28 fc c8 a9 00 00 00 00  .4p.D...(.......
000000000233ff0c  27 34 70 80 08 00 00 00 - 46 02 00 00 09 22 4e 80  '4p.....F...."N.
000000000233ff1c  18 7e a9 82 a8 7d a9 82 - 3f 22 4e 80 14 7f a9 82  .~...}..?"N.....
000000000233ff2c  a8 7d a9 82 80 ff 33 02 - 99 66 e7 77 4c ff 33 02  .}....3..f.wL.3.
000000000233ff3c  a9 66 e7 77 ed 10 90 7c - 18 11 19 00 18 f9 18 00  .f.w...|........
000000000233ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0xa30 <----*

eax=774f319a ebx=00007530 ecx=7ffdf000 edx=00000000 esi=00000000 edi=0243ff50
eip=7c90eb94 esp=0243ff20 ebp=0243ff78 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000206

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr  Args to Child              
0243ff78 7c802451 0000ea60 00000000 0243ffb4 ntdll!KiFastSystemCallRet
0243ff88 774f2fcb 0000ea60 00193d80 774f314d kernel32!Sleep+0xf
0243ffb4 7c80b50b 00193d80 7c910945 7c91094e ole32!StringFromGUID2+0x2d1
0243ffec 00000000 774f319a 00193d80 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000243ff20  5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff 43 02  \..|.#.|....P.C.
000000000243ff30  50 25 80 7c f0 56 60 77 - 30 75 00 00 14 00 00 00  P%.|.V`w0u......
000000000243ff40  01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00  ................
000000000243ff50  00 ba 3c dc ff ff ff ff - 08 4f 4e 77 50 ff 43 02  ..<......ONwP.C.
000000000243ff60  30 ff 43 02 c8 4e 15 00 - dc ff 43 02 f3 99 83 7c  0.C..N....C....|
000000000243ff70  58 24 80 7c 00 00 00 00 - 88 ff 43 02 51 24 80 7c  X$.|......C.Q$.|
000000000243ff80  60 ea 00 00 00 00 00 00 - b4 ff 43 02 cb 2f 4f 77  `.........C../Ow
000000000243ff90  60 ea 00 00 80 3d 19 00 - 4d 31 4f 77 00 00 00 00  `....=..M1Ow....
000000000243ffa0  45 09 91 7c 80 3d 19 00 - 00 00 4e 77 b5 31 4f 77  E..|.=....Nw.1Ow
000000000243ffb0  4e 09 91 7c ec ff 43 02 - 0b b5 80 7c 80 3d 19 00  N..|..C....|.=..
000000000243ffc0  45 09 91 7c 4e 09 91 7c - 80 3d 19 00 00 c0 fd 7f  E..|N..|.=......
000000000243ffd0  00 06 fc 82 c0 ff 43 02 - f0 d6 9f 82 ff ff ff ff  ......C.........
000000000243ffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
000000000243fff0  00 00 00 00 9a 31 4f 77 - 80 3d 19 00 00 00 00 00  .....1Ow.=......
0000000002440000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002440010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002440020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002440030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002440040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002440050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xe28 <----*

eax=001948b0 ebx=00000000 ecx=001757a0 edx=001948b0 esi=001532f8 edi=00000100
eip=7c90eb94 esp=0253fe1c ebp=0253ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0253ff80 77e76c22 0253ffa8 77e76a3b 001532f8 ntdll!KiFastSystemCallRet
0253ff88 77e76a3b 001532f8 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
0253ffa8 77e76c0a 00163bd0 0253ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0253ffb4 7c80b50b 00194898 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
0253ffec 00000000 77e76bf0 00194898 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000253fe1c  99 e3 90 7c 03 67 e7 77 - 84 02 00 00 70 ff 53 02  ...|.g.w....p.S.
000000000253fe2c  00 00 00 00 48 64 19 00 - 54 ff 53 02 00 23 fc 82  ....Hd..T.S..#..
000000000253fe3c  fa 22 55 80 00 00 04 00 - 98 81 a4 82 78 ee d7 82  ."U.........x...
000000000253fe4c  c0 3a 01 c0 02 00 00 00 - 00 00 ea 01 48 f6 00 00  .:..........H...
000000000253fe5c  c0 26 c4 81 00 00 00 00 - 9c 36 50 c0 90 83 a4 82  .&.......6P.....
000000000253fe6c  1e 00 00 00 84 eb 1b aa - 1d fb 4e 80 40 f5 df ff  ..........N.@...
000000000253fe7c  02 fe 1f c0 46 89 4e 80 - 00 50 f9 7f b0 eb 1b aa  ....F.N..P......
000000000253fe8c  54 fe 1f c0 90 eb 1b aa - 13 ae 4e 80 00 40 f9 7f  T.........N..@..
000000000253fe9c  01 00 00 00 00 00 00 00 - 50 fe 1f c0 00 00 00 00  ........P.......
000000000253feac  fc 07 30 c0 48 ec 1b aa - 6a fc 4e 80 b0 eb 1b aa  ..0.H...j.N.....
000000000253febc  00 00 00 00 00 00 00 00 - 80 c5 c8 82 98 81 a4 82  ................
000000000253fecc  01 82 a4 82 00 00 00 00 - 50 fe 1f c0 00 00 00 00  ........P.......
000000000253fedc  d1 00 00 00 ff ff e6 04 - 00 00 04 00 6f 4e 00 00  ............oN..
000000000253feec  64 82 a4 82 1f 00 00 00 - 40 f5 df ff 69 cf 4d 80  d.......@...i.M.
000000000253fefc  ff ff ff ff 46 02 00 00 - 77 cd 4d 80 28 ec 1b aa  ....F...w.M.(...
000000000253ff0c  30 a2 ef 82 20 b1 95 f8 - cc a3 ef 82 09 22 4e 80  0... ........"N.
000000000253ff1c  a0 a2 ef 82 30 a2 ef 82 - 3f 22 4e 80 9c a3 ef 82  ....0...?"N.....
000000000253ff2c  30 a2 ef 82 80 ff 53 02 - 99 66 e7 77 4c ff 53 02  0.....S..f.wL.S.
000000000253ff3c  a9 66 e7 77 ed 10 90 7c - 70 48 19 00 98 48 19 00  .f.w...|pH...H..
000000000253ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0xa6c <----*

eax=00000001 ebx=7c90e9b4 ecx=71a52c66 edx=00040000 esi=00000000 edi=00000001
eip=7c90eb94 esp=02b7fad0 ebp=02b7fb0c iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\mswsock.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\WS2_32.dll -
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\WININET.dll -
ChildEBP RetAddr  Args to Child              
02b7fb0c 71a55fa7 0000038c 000003c0 00000001 ntdll!KiFastSystemCallRet
02b7fc00 71ab2e67 00000001 02b7fe80 02b7fc78 mswsock+0x5fa7
02b7fc50 771d71bf 00000001 02b7fe80 02b7fc78 WS2_32!select+0xa7
02b7ffac 771d92f3 02b7ffec 7c80b50b 001950e8 WININET!GetUrlCacheEntryInfoExW+0x88d
02b7ffb4 7c80b50b 001950e8 7727a626 001ad538 WININET!InternetSetStatusCallback+0x1d7
02b7ffec 00000000 771d92e6 001950e8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000002b7fad0  c0 e9 90 7c a5 3c a5 71 - 8c 03 00 00 01 00 00 00  ...|.<.q........
0000000002b7fae0  f8 fa b7 02 b0 fb b7 02 - 80 fe b7 02 a0 fb b7 02  ................
0000000002b7faf0  6c fb b7 02 ef d8 90 7c - c0 b4 b3 ff ff ff ff ff  l......|........
0000000002b7fb00  f0 db 1a 00 00 00 00 00 - 00 00 00 00 00 fc b7 02  ................
0000000002b7fb10  a7 5f a5 71 8c 03 00 00 - c0 03 00 00 01 00 00 00  ._.q............
0000000002b7fb20  04 00 00 00 7c fd b7 02 - c8 59 a1 02 78 fc b7 02  ....|....Y..x...
0000000002b7fb30  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002b7fb40  01 00 00 00 80 0f 05 fd - ff ff ff ff 00 00 00 00  ................
0000000002b7fb50  00 00 00 00 00 00 00 00 - 40 fb b7 02 f0 db 1a 00  ........@.......
0000000002b7fb60  33 27 00 00 1c fb b7 02 - 00 00 00 00 dc ff b7 02  3'..............
0000000002b7fb70  34 fc b7 02 b8 44 a5 71 - ff ff ff ff 1c 00 00 00  4....D.q........
0000000002b7fb80  f0 db 1a 00 bc fb b7 02 - 78 fc b7 02 7c fd b7 02  ........x...|...
0000000002b7fb90  00 00 00 00 a0 fb b7 02 - 00 00 00 00 00 00 00 00  ................
0000000002b7fba0  80 0f 05 fd ff ff ff ff - 01 00 00 00 00 cf 1b 00  ................
0000000002b7fbb0  c0 03 00 00 19 00 00 00 - e4 fb b7 02 a3 2e ad 71  ...............q
0000000002b7fbc0  9c 04 00 00 dc fb b7 02 - 01 00 00 00 f4 fb b7 02  ................
0000000002b7fbd0  f0 fb b7 02 00 00 00 00 - 00 00 00 00 01 00 00 00  ................
0000000002b7fbe0  13 fc b7 02 0a 49 00 00 - 24 fb b7 02 0c 15 aa 71  .....I..$......q
0000000002b7fbf0  40 fc b7 02 c8 71 a7 71 - 68 2e a5 71 ff ff ff ff  @....q.qh..q....
0000000002b7fc00  50 fc b7 02 67 2e ab 71 - 01 00 00 00 80 fe b7 02  P...g..q........

*----> State Dump for Thread Id 0x908 <----*

eax=00000000 ebx=00000000 ecx=02cbff9c edx=7c90eb94 esi=0013ba58 edi=02080000
eip=7c90eb94 esp=02cbff9c ebp=02cbffb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
02cbffb4 7c80b50b 00000000 02080000 0013ba58 ntdll!KiFastSystemCallRet
02cbffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000002cbff9c  5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff cb 02  \..|.y.|........
0000000002cbffac  00 00 00 00 00 00 00 80 - ec ff cb 02 0b b5 80 7c  ...............|
0000000002cbffbc  00 00 00 00 00 00 08 02 - 58 ba 13 00 00 00 00 00  ........X.......
0000000002cbffcc  00 90 fd 7f 00 26 fc 82 - c0 ff cb 02 38 23 cd 82  .....&......8#..
0000000002cbffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00  .......|...|....
0000000002cbffec  00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00  .........y.|....
0000000002cbfffc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc000c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc001c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc002c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc003c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc004c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc005c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc006c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc007c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc008c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc009c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc00ac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc00bc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002cc00cc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xd4 <----*

eax=02dbf594 ebx=00000000 ecx=80004005 edx=000000c8 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=02dbff70 ebp=02dbffb4 iopl=0         nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000286

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
02dbffb4 7c80b50b 00000000 001b0b10 0000004d ntdll!KiFastSystemCallRet
02dbffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000002dbff70  1b e3 90 7c 9d 07 91 7c - c4 03 00 00 ac ff db 02  ...|...|........
0000000002dbff80  b0 ff db 02 98 ff db 02 - a0 ff db 02 10 0b 1b 00  ................
0000000002dbff90  4d 00 00 00 00 00 00 00 - 00 00 00 00 c8 ce 21 00  M.............!.
0000000002dbffa0  00 7c 28 e8 ff ff ff ff - a0 3c bc a9 69 75 92 7c  .|(......<..iu.|
0000000002dbffb0  c8 02 1b 00 ec ff db 02 - 0b b5 80 7c 00 00 00 00  ...........|....
0000000002dbffc0  10 0b 1b 00 4d 00 00 00 - 00 00 00 00 00 80 fd 7f  ....M...........
0000000002dbffd0  00 06 fc 82 c0 ff db 02 - 38 23 cd 82 ff ff ff ff  ........8#......
0000000002dbffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
0000000002dbfff0  00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00  ....`..|........
0000000002dc0000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002dc0010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002dc0020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002dc0030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002dc0040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002dc0050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002dc0060  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002dc0070  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002dc0080  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002dc0090  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002dc00a0  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x59c <----*

eax=00001326 ebx=7c901005 ecx=0000016d edx=00150000 esi=000003c8 edi=00000000
eip=7c90eb94 esp=02ebff14 ebp=02ebff78 iopl=0         nv up ei ng nz ac pe cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000293

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
02ebff78 7c802542 000003c8 000927c0 00000000 ntdll!KiFastSystemCallRet
02ebff8c 7d5247d5 000003c8 000927c0 00000005 kernel32!WaitForSingleObject+0x12
02ebffb4 7c80b50b 02564790 00000005 0016dce0 mshtml+0x847d5
02ebffec 00000000 7d572e3f 02564790 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000002ebff14  c0 e9 90 7c db 25 80 7c - c8 03 00 00 00 00 00 00  ...|.%.|........
0000000002ebff24  48 ff eb 02 00 00 00 00 - 90 47 56 02 05 10 90 7c  H........GV....|
0000000002ebff34  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002ebff44  10 00 00 00 00 44 5f 9a - fe ff ff ff 00 f0 fd 7f  .....D_.........
0000000002ebff54  00 70 fd 7f 48 ff eb 02 - 00 69 57 02 28 ff eb 02  .p..H....iW.(...
0000000002ebff64  3f bf 4f 7d dc ff eb 02 - f3 99 83 7c 08 26 80 7c  ?.O}.......|.&.|
0000000002ebff74  00 00 00 00 8c ff eb 02 - 42 25 80 7c c8 03 00 00  ........B%.|....
0000000002ebff84  c0 27 09 00 00 00 00 00 - b4 ff eb 02 d5 47 52 7d  .'...........GR}
0000000002ebff94  c8 03 00 00 c0 27 09 00 - 05 00 00 00 90 47 56 02  .....'.......GV.
0000000002ebffa4  90 47 56 02 7a 2e 57 7d - e0 dc 16 00 4c 2e 57 7d  .GV.z.W}....L.W}
0000000002ebffb4  ec ff eb 02 0b b5 80 7c - 90 47 56 02 05 00 00 00  .......|.GV.....
0000000002ebffc4  e0 dc 16 00 90 47 56 02 - 00 70 fd 7f 00 26 fc 82  .....GV..p...&..
0000000002ebffd4  c0 ff eb 02 c0 80 9c 82 - ff ff ff ff f3 99 83 7c  ...............|
0000000002ebffe4  18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00  ...|............
0000000002ebfff4  3f 2e 57 7d 90 47 56 02 - 00 00 00 00 c8 00 00 00  ?.W}.GV.........
0000000002ec0004  97 01 00 00 ff ee ff ee - 02 10 00 00 00 00 00 00  ................
0000000002ec0014  00 fe 00 00 00 00 10 00 - 00 20 00 00 00 02 00 00  ......... ......
0000000002ec0024  00 20 00 00 1e 14 00 00 - ff ef fd 7f 15 00 08 06  . ..............
0000000002ec0034  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002ec0044  98 05 ec 02 0f 00 00 00 - f8 ff ff ff 50 00 ec 02  ............P...

*----> State Dump for Thread Id 0x6dc <----*

eax=71a5d5af ebx=c0000000 ecx=7c913288 edx=ffffffff esi=00000000 edi=71a87558
eip=7c90eb94 esp=02ffff7c ebp=02ffffb4 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
02ffffb4 7c80b50b 71a5d8ec 02dbf910 7c90ee18 ntdll!KiFastSystemCallRet
02ffffec 00000000 71a5d5af 001c7908 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000002ffff7c  1b e3 90 7c 09 d6 a5 71 - a0 04 00 00 bc ff ff 02  ...|...q........
0000000002ffff8c  b0 ff ff 02 a4 ff ff 02 - 50 d6 a5 71 10 f9 db 02  ........P..q....
0000000002ffff9c  18 ee 90 7c 08 79 1c 00 - 00 00 00 00 00 00 00 00  ...|.y..........
0000000002ffffac  00 00 a5 71 f0 27 b8 02 - ec ff ff 02 0b b5 80 7c  ...q.'.........|
0000000002ffffbc  ec d8 a5 71 10 f9 db 02 - 18 ee 90 7c 08 79 1c 00  ...q.......|.y..
0000000002ffffcc  00 60 fd 7f 00 06 fc 82 - c0 ff ff 02 38 23 cd 82  .`..........8#..
0000000002ffffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00  .......|...|....
0000000002ffffec  00 00 00 00 00 00 00 00 - af d5 a5 71 08 79 1c 00  ...........q.y..
0000000002fffffc  00 00 00 00 4d 5a 90 00 - 03 00 00 00 04 00 00 00  ....MZ..........
000000000300000c  ff ff 00 00 b8 00 00 00 - 00 00 00 00 40 00 00 00  ............@...
000000000300001c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000300002c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000300003c  f8 00 00 00 0e 1f ba 0e - 00 b4 09 cd 21 b8 01 4c  ............!..L
000000000300004c  cd 21 54 68 69 73 20 70 - 72 6f 67 72 61 6d 20 63  .!This program c
000000000300005c  61 6e 6e 6f 74 20 62 65 - 20 72 75 6e 20 69 6e 20  annot be run in
000000000300006c  44 4f 53 20 6d 6f 64 65 - 2e 0d 0d 0a 24 00 00 00  DOS mode....$...
000000000300007c  00 00 00 00 33 ed b4 8e - 77 8c da dd 77 8c da dd  ....3...w...w...
000000000300008c  77 8c da dd 0c 90 d6 dd - 75 8c da dd 18 93 d1 dd  w.......u.......
000000000300009c  7f 8c da dd f4 90 d4 dd - 60 8c da dd 18 93 d0 dd  ........`.......
00000000030000ac  04 8c da dd 77 8c da dd - 71 8c da dd ad af c6 dd  ....w...q.......

*----> State Dump for Thread Id 0xbe0 <----*

eax=77a8964a ebx=0314ff18 ecx=0013c958 edx=0015bd20 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=0314fef0 ebp=0314ff8c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\CRYPT32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0314ff8c 77a89675 00000001 001c50b0 00000000 ntdll!KiFastSystemCallRet
0314ffb4 7c80b50b 00000001 00150000 7c916433 CRYPT32!CertEnumSystemStoreLocation+0x133f
0314ffec 00000000 77a8964a 001c50a8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000314fef0  ab e9 90 7c f2 94 80 7c - 01 00 00 00 18 ff 14 03  ...|...|........
000000000314ff00  01 00 00 00 00 00 00 00 - 4c ff 14 03 00 00 00 00  ........L.......
000000000314ff10  a8 50 1c 00 b0 50 1c 00 - d0 04 00 00 20 d8 d9 82  .P...P...... ...
000000000314ff20  b0 d7 d9 82 3f 22 4e 80 - 1c d9 d9 82 b0 d7 d9 82  ....?"N.........
000000000314ff30  e4 d7 d9 82 00 00 00 00 - 14 00 00 00 01 00 00 00  ................
000000000314ff40  00 00 00 00 00 00 00 00 - 10 00 00 00 80 2e 0f f7  ................
000000000314ff50  ff ff ff ff 05 00 00 00 - 00 f0 fd 7f 00 50 fd 7f  .............P..
000000000314ff60  00 00 00 00 4c ff 14 03 - 18 ff 14 03 e4 d7 d9 82  ....L...........
000000000314ff70  01 00 00 00 0c ff 14 03 - b0 d7 d9 82 dc ff 14 03  ................
000000000314ff80  f3 99 83 7c 90 95 80 7c - 00 00 00 00 b4 ff 14 03  ...|...|........
000000000314ff90  75 96 a8 77 01 00 00 00 - b0 50 1c 00 00 00 00 00  u..w.....P......
000000000314ffa0  98 3a 00 00 00 00 00 00 - 00 00 15 00 33 64 91 7c  .:..........3d.|
000000000314ffb0  a8 50 1c 00 ec ff 14 03 - 0b b5 80 7c 01 00 00 00  .P.........|....
000000000314ffc0  00 00 15 00 33 64 91 7c - a8 50 1c 00 00 50 fd 7f  ....3d.|.P...P..
000000000314ffd0  00 26 fc 82 c0 ff 14 03 - b0 a0 9c 82 ff ff ff ff  .&..............
000000000314ffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
000000000314fff0  00 00 00 00 4a 96 a8 77 - a8 50 1c 00 00 00 00 00  ....J..w.P......
0000000003150000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003150010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003150020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xb9c <----*

eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=0324fcec ebp=0324ffb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0324ffb4 7c80b50b 00000000 00150000 00000000 ntdll!KiFastSystemCallRet
0324ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000324fcec  ab e9 90 7c d5 a0 92 7c - 14 00 00 00 30 fd 24 03  ...|...|....0.$.
000000000324fcfc  01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 15 00  ................
000000000324fd0c  00 00 00 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c  ...........|...|
000000000324fd1c  dc 04 00 00 9c 0b 00 00 - 14 00 00 00 14 00 00 00  ................
000000000324fd2c  13 00 00 00 d4 04 00 00 - 38 00 00 00 18 05 00 00  ........8.......
000000000324fd3c  24 05 00 00 40 05 00 00 - 4c 05 00 00 58 05 00 00  $...@...L...X...
000000000324fd4c  78 05 00 00 80 05 00 00 - 88 05 00 00 94 05 00 00  x...............
000000000324fd5c  9c 05 00 00 a8 05 00 00 - b4 05 00 00 c0 05 00 00  ................
000000000324fd6c  c8 05 00 00 d4 05 00 00 - e0 05 00 00 ec 05 00 00  ................
000000000324fd7c  f4 05 00 00 10 06 00 00 - 1c 06 00 00 28 06 00 00  ............(...
000000000324fd8c  34 06 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  4...............
000000000324fd9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000324fdac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000324fdbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000324fdcc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000324fddc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000324fdec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000324fdfc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000324fe0c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000324fe1c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xa28 <----*

eax=769c8831 ebx=0334fef4 ecx=0013c6d4 edx=0013c988 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=0334fecc ebp=0334ff68 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\USERENV.dll -
ChildEBP RetAddr  Args to Child              
0334ff68 7c809c86 00000003 76a60310 00000000 ntdll!KiFastSystemCallRet
0334ff84 769c888d 00000003 76a60310 00000000 kernel32!WaitForMultipleObjects+0x18
0334ffb4 7c80b50b 00000000 00000000 00000000 USERENV!UnregisterGPNotification+0x15c
0334ffec 00000000 769c8831 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000334fecc  ab e9 90 7c f2 94 80 7c - 03 00 00 00 f4 fe 34 03  ...|...|......4.
000000000334fedc  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000334feec  b8 03 a6 76 77 9b 80 7c - 28 05 00 00 2c 05 00 00  ...vw..|(...,...
000000000334fefc  30 05 00 00 5c fe 34 03 - 6c ff 34 03 6c ff 34 03  0...\.4.l.4.l.4.
000000000334ff0c  18 ee 90 7c 70 05 91 7c - 14 00 00 00 01 00 00 00  ...|p..|........
000000000334ff1c  00 00 00 00 00 00 00 00 - 10 00 00 00 f6 1b 80 7c  ...............|
000000000334ff2c  00 00 00 00 00 00 00 00 - 00 f0 fd 7f 00 f0 fa 7f  ................
000000000334ff3c  20 bd 15 00 00 00 00 00 - f4 fe 34 03 00 00 00 00   .........4.....
000000000334ff4c  03 00 00 00 e8 fe 34 03 - 00 00 00 00 dc ff 34 03  ......4.......4.
000000000334ff5c  f3 99 83 7c 90 95 80 7c - 00 00 00 00 84 ff 34 03  ...|...|......4.
000000000334ff6c  86 9c 80 7c 03 00 00 00 - 10 03 a6 76 00 00 00 00  ...|.......v....
000000000334ff7c  ff ff ff ff 00 00 00 00 - b4 ff 34 03 8d 88 9c 76  ..........4....v
000000000334ff8c  03 00 00 00 10 03 a6 76 - 00 00 00 00 ff ff ff ff  .......v........
000000000334ff9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 9c 76  ...............v
000000000334ffac  03 00 00 00 00 00 00 00 - ec ff 34 03 0b b5 80 7c  ..........4....|
000000000334ffbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000334ffcc  00 f0 fa 7f 00 06 fc 82 - c0 ff 34 03 58 5d e6 82  ..........4.X]..
000000000334ffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00  .......|...|....
000000000334ffec  00 00 00 00 00 00 00 00 - 31 88 9c 76 00 00 00 00  ........1..v....
000000000334fffc  00 00 00 00 c8 00 00 00 - d4 01 00 00 ff ee ff ee  ................

*----> State Dump for Thread Id 0x508 <----*

eax=77df9981 ebx=0354fed0 ecx=00000006 edx=00000000 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=0354fea8 ebp=0354ff44 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ADVAPI32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0354ff44 77df9b26 00000002 0354ff6c 00000000 ntdll!KiFastSystemCallRet
0354ffb4 7c80b50b 00000000 7c9140bb 00000000 ADVAPI32!RegDeleteKeyW+0x2a2
0354ffec 00000000 77df9981 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000354fea8  ab e9 90 7c f2 94 80 7c - 02 00 00 00 d0 fe 54 03  ...|...|......T.
000000000354feb8  01 00 00 00 01 00 00 00 - 04 ff 54 03 b0 30 35 03  ..........T..05.
000000000354fec8  40 65 e4 77 00 10 00 00 - 14 06 00 00 20 06 00 00  @e.w........ ...
000000000354fed8  c0 fe 54 03 21 fa de 7a - dc ff 54 03 f3 99 83 7c  ..T.!..z..T....|
000000000354fee8  c8 0c 81 7c 00 10 00 00 - 14 00 00 00 01 00 00 00  ...|............
000000000354fef8  00 00 00 00 00 00 00 00 - 10 00 00 00 00 a2 2f 4d  ............../M
000000000354ff08  ff ff ff ff 00 10 00 00 - 00 f0 fd 7f 00 e0 fa 7f  ................
000000000354ff18  dc ff 54 03 04 ff 54 03 - d0 fe 54 03 06 00 00 00  ..T...T...T.....
000000000354ff28  02 00 00 00 c4 fe 54 03 - 06 00 00 00 dc ff 54 03  ......T.......T.
000000000354ff38  f3 99 83 7c 90 95 80 7c - 00 00 00 00 b4 ff 54 03  ...|...|......T.
000000000354ff48  26 9b df 77 02 00 00 00 - 6c ff 54 03 00 00 00 00  &..w....l.T.....
000000000354ff58  e0 93 04 00 01 00 00 00 - bb 40 91 7c 00 00 00 00  .........@.|....
000000000354ff68  00 00 00 00 14 06 00 00 - 20 06 00 00 00 10 00 00  ........ .......
000000000354ff78  b0 30 35 03 00 00 00 00 - 00 10 00 00 b8 40 35 03  .05..........@5.
000000000354ff88  a0 66 e4 77 20 00 00 00 - 80 66 e4 77 00 10 00 00  .f.w ....f.w....
000000000354ff98  00 00 00 00 a0 66 e4 77 - b0 30 35 03 80 66 e4 77  .....f.w.05..f.w
000000000354ffa8  e5 03 00 00 00 10 00 00 - b8 40 35 03 ec ff 54 03  .........@5...T.
000000000354ffb8  0b b5 80 7c 00 00 00 00 - bb 40 91 7c 00 00 00 00  ...|.....@.|....
000000000354ffc8  00 00 00 00 00 e0 fa 7f - 00 06 fc 82 c0 ff 54 03  ..............T.
000000000354ffd8  60 fd 66 82 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  `.f........|...|

*----> State Dump for Thread Id 0xa64 <----*

eax=0399fe58 ebx=00000000 ecx=00000000 edx=000f3df7 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=0399ff70 ebp=0399ffb4 iopl=0         nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000286

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0399ffb4 7c80b50b 00000000 00212c08 00000026 ntdll!KiFastSystemCallRet
0399ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000399ff70  1b e3 90 7c 9d 07 91 7c - c4 03 00 00 ac ff 99 03  ...|...|........
000000000399ff80  b0 ff 99 03 98 ff 99 03 - a0 ff 99 03 08 2c 21 00  .............,!.
000000000399ff90  26 00 00 00 00 00 00 00 - 00 00 00 00 90 ec 21 00  &.............!.
000000000399ffa0  00 7c 28 e8 ff ff ff ff - a0 8c ae aa 69 75 92 7c  .|(.........iu.|
000000000399ffb0  e0 43 21 00 ec ff 99 03 - 0b b5 80 7c 00 00 00 00  .C!........|....
000000000399ffc0  08 2c 21 00 26 00 00 00 - 00 00 00 00 00 d0 fa 7f  .,!.&...........
000000000399ffd0  00 26 fc 82 c0 ff 99 03 - 28 7a cc 82 ff ff ff ff  .&......(z......
000000000399ffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
000000000399fff0  00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00  ....`..|........
00000000039a0000  17 ef c8 ca 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000039a0010  82 e0 84 89 91 00 21 00 - bf 5e e1 c4 30 00 50 00  ......!..^..0.P.
00000000039a0020  cd 13 84 00 58 02 c2 01 - e2 4d 60 e1 50 00 50 00  ....X....M`.P.P.
00000000039a0030  02 21 7c ab 12 00 12 00 - 8b 1b 2d 5a 3c 00 3c 00  .!|.......-Z<.<.
00000000039a0040  9e 8e 05 5f 50 00 50 00 - 52 82 2b ce 10 00 10 00  ..._P.P.R.+.....
00000000039a0050  6d 15 ce 64 3c 00 2d 00 - c6 15 0e 7e 80 00 18 00  m..d<.-....~....
00000000039a0060  fd f8 42 c0 3c 00 52 00 - 50 2b 1f 1b 40 00 2b 00  ..B.<.R.P+..@.+.
00000000039a0070  7d 08 1c 85 10 00 10 00 - db 4e d9 8a bc 00 fa 00  }........N......
00000000039a0080  b2 85 be 0f 10 00 10 00 - 3a 54 a4 80 3c 00 10 00  ........:T..<...
00000000039a0090  75 13 60 28 0f 00 0f 00 - b1 2d 94 4a 3c 00 3c 00  u.`(.....-.J<.<.
00000000039a00a0  c0 05 97 34 0f 00 0c 00 - 21 f8 3d 1a 90 01 2c 01  ...4....!.=...,.

*----> State Dump for Thread Id 0x90c <----*

eax=03ccf924 ebx=7c901005 ecx=03555658 edx=00000000 esi=00000650 edi=00000000
eip=7c90eb94 esp=03aaff14 ebp=03aaff78 iopl=0         nv up ei ng nz ac pe cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000293

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
03aaff78 7c802542 00000650 000927c0 00000000 ntdll!KiFastSystemCallRet
03aaff8c 7d5247d5 00000650 000927c0 772d1808 kernel32!WaitForSingleObject+0x12
03aaffb4 7c80b50b 0257c7a0 772d1808 00000004 mshtml+0x847d5
03aaffec 00000000 7d572e3f 0257c7a0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000003aaff14  c0 e9 90 7c db 25 80 7c - 50 06 00 00 00 00 00 00  ...|.%.|P.......
0000000003aaff24  48 ff aa 03 00 00 00 00 - a0 c7 57 02 05 10 90 7c  H.........W....|
0000000003aaff34  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003aaff44  10 00 00 00 00 44 5f 9a - fe ff ff ff 00 f0 fd 7f  .....D_.........
0000000003aaff54  00 c0 fa 7f 48 ff aa 03 - 42 f0 51 7d 28 ff aa 03  ....H...B.Q}(...
0000000003aaff64  04 c8 57 02 dc ff aa 03 - f3 99 83 7c 08 26 80 7c  ..W........|.&.|
0000000003aaff74  00 00 00 00 8c ff aa 03 - 42 25 80 7c 50 06 00 00  ........B%.|P...
0000000003aaff84  c0 27 09 00 00 00 00 00 - b4 ff aa 03 d5 47 52 7d  .'...........GR}
0000000003aaff94  50 06 00 00 c0 27 09 00 - 08 18 2d 77 a0 c7 57 02  P....'....-w..W.
0000000003aaffa4  a0 c7 57 02 7a 2e 57 7d - 04 00 00 00 4c 2e 57 7d  ..W.z.W}....L.W}
0000000003aaffb4  ec ff aa 03 0b b5 80 7c - a0 c7 57 02 08 18 2d 77  .......|..W...-w
0000000003aaffc4  04 00 00 00 a0 c7 57 02 - 00 c0 fa 7f 00 26 fc 82  ......W......&..
0000000003aaffd4  c0 ff aa 03 a0 0b 9f 82 - ff ff ff ff f3 99 83 7c  ...............|
0000000003aaffe4  18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00  ...|............
0000000003aafff4  3f 2e 57 7d a0 c7 57 02 - 00 00 00 00 00 00 00 00  ?.W}..W.........
0000000003ab0004  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003ab0014  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003ab0024  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003ab0034  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003ab0044  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x328 <----*

eax=72d230e8 ebx=0422fef8 ecx=00000071 edx=00000000 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=0422fed0 ebp=0422ff6c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv -
ChildEBP RetAddr  Args to Child              
0422ff6c 7c809c86 00000002 0422ffa4 00000000 ntdll!KiFastSystemCallRet
0422ff88 72d2312a 00000002 0422ffa4 00000000 kernel32!WaitForMultipleObjects+0x18
0422ffb4 7c80b50b 00000000 00000000 00150000 wdmaud!midMessage+0x348
0422ffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000422fed0  ab e9 90 7c f2 94 80 7c - 02 00 00 00 f8 fe 22 04  ...|...|......".
000000000422fee0  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000422fef0  00 00 00 00 00 00 00 00 - 88 06 00 00 7c 06 00 00  ............|...
000000000422ff00  cc b3 a4 82 28 bc f9 aa - 00 00 00 00 27 34 70 80  ....(.......'4p.
000000000422ff10  08 00 00 00 46 02 00 00 - 14 00 00 00 01 00 00 00  ....F...........
000000000422ff20  00 00 00 00 00 00 00 00 - 10 00 00 00 30 b2 a4 82  ............0...
000000000422ff30  64 b2 a4 82 00 00 00 00 - 00 f0 fd 7f 00 b0 fa 7f  d...............
000000000422ff40  30 b2 a4 82 00 00 00 00 - f8 fe 22 04 9c bb 4f 80  0........."...O.
000000000422ff50  02 00 00 00 ec fe 22 04 - 00 00 00 00 dc ff 22 04  ......".......".
000000000422ff60  f3 99 83 7c 90 95 80 7c - 00 00 00 00 88 ff 22 04  ...|...|......".
000000000422ff70  86 9c 80 7c 02 00 00 00 - a4 ff 22 04 00 00 00 00  ...|......".....
000000000422ff80  ff ff ff ff 00 00 00 00 - b4 ff 22 04 2a 31 d2 72  ..........".*1.r
000000000422ff90  02 00 00 00 a4 ff 22 04 - 00 00 00 00 ff ff ff ff  ......".........
000000000422ffa0  00 00 15 00 88 06 00 00 - 7c 06 00 00 f2 3e 70 80  ........|....>p.
000000000422ffb0  dc e2 90 7c ec ff 22 04 - 0b b5 80 7c 00 00 00 00  ...|.."....|....
000000000422ffc0  00 00 00 00 00 00 15 00 - 00 00 00 00 00 b0 fa 7f  ................
000000000422ffd0  00 26 fc 82 c0 ff 22 04 - 70 9e 7a 82 ff ff ff ff  .&....".p.z.....
000000000422ffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
000000000422fff0  00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00  .....0.r........
0000000004230000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x694 <----*

eax=000011a5 ebx=000006b0 ecx=00000000 edx=0432ff54 esi=0432ff98 edi=77d6ea45
eip=7c90eb94 esp=0432ff54 ebp=0432ff78 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\WINMM.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0432ff78 76b44e3d 0432ff98 00000000 00000000 ntdll!KiFastSystemCallRet
0432ffb4 7c80b50b 000006b0 00000200 0000002b WINMM!PlaySoundW+0x7e6
0432ffec 00000000 76b44dd6 000006b0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000432ff54  9b 91 d4 77 85 ea d6 77 - 98 ff 32 04 00 00 00 00  ...w...w..2.....
000000000432ff64  00 00 00 00 00 00 00 00 - b0 06 00 00 45 ea d6 77  ............E..w
000000000432ff74  00 00 00 00 b4 ff 32 04 - 3d 4e b4 76 98 ff 32 04  ......2.=N.v..2.
000000000432ff84  00 00 00 00 00 00 00 00 - 00 00 00 00 00 02 00 00  ................
000000000432ff94  2b 00 00 00 3e 04 44 00 - bc 03 00 00 e0 b0 21 00  +...>.D.......!.
000000000432ffa4  00 00 00 00 73 f4 3d 0f - f5 00 00 00 32 01 00 00  ....s.=.....2...
000000000432ffb4  ec ff 32 04 0b b5 80 7c - b0 06 00 00 00 02 00 00  ..2....|........
000000000432ffc4  2b 00 00 00 b0 06 00 00 - 00 a0 fa 7f 00 06 fc 82  +...............
000000000432ffd4  c0 ff 32 04 d0 05 db 82 - ff ff ff ff f3 99 83 7c  ..2............|
000000000432ffe4  18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00  ...|............
000000000432fff4  d6 4d b4 76 b0 06 00 00 - 00 00 00 00 c1 00 00 00  .M.v............
0000000004330004  80 01 00 00 ff ee ff ee - 03 10 00 00 01 00 00 00  ................
0000000004330014  00 fe 00 00 00 00 10 00 - 00 20 00 00 00 02 00 00  ......... ......
0000000004330024  00 20 00 00 47 01 00 00 - ff ef fd 7f 19 00 08 06  . ..G...........
0000000004330034  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000004330044  98 05 33 04 0f 00 00 00 - f8 ff ff ff 50 00 33 04  ..3.........P.3.
0000000004330054  50 00 33 04 08 06 33 04 - 00 00 00 00 00 00 00 00  P.3...3.........
0000000004330064  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000004330074  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000004330084  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................



Application exception occurred:
        App: C:\Program Files\Winamp\winamp.exe (pid=2312)
        When: 11/23/2004 @ 17:03:48.328
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: DAKAHRABAH
        User Name: Anyone
        Terminal Session Id: 4
        Number of Processors: 2
        Processor Type: x86 Family 15 Model 3 Stepping 4
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 2
        Current Type: Multiprocessor Free
        Registered Organization:
        Registered Owner:  

*----> Task List <----*
   0 System Process
   4 Error 0xD0000022
 684 Error 0xD0000022
 744 Error 0xD0000022
 768 Error 0xD0000022
 812 Error 0xD0000022
 824 Error 0xD0000022
 988 Error 0xD0000022
1056 Error 0xD0000022
1152 Error 0xD0000022
1252 Error 0xD0000022
1316 Error 0xD0000022
1532 Error 0xD0000022
1804 Error 0xD0000022
1904 Error 0xD0000022
1920 Error 0xD0000022
 292 Error 0xD0000022
 464 Error 0xD0000022
 496 Error 0xD0000022
1104 Error 0xD0000022
1144 Error 0xD0000022
1260 Error 0xD0000022
1328 Error 0xD0000022
2812 Error 0xD0000022
3368 Error 0xD0000022
3916 Error 0xD0000022
3008 Error 0xD0000022
4036 Error 0xD0000022
 192 Error 0xD0000022
3220 Error 0xD0000022
2856 Error 0xD0000022
3732 Explorer.EXE
2840 ccApp.exe
1856 winampa.exe
 588 LUCOMS~1.EXE
1880 qttask.exe
2640 msmsgs.exe
3600 BigFix.exe
1912 msnmsgr.exe
2992 iexplore.exe
2312 winamp.exe
1208 drwtsn32.exe

*----> Module List <----*
(0000000000400000 - 0000000000503000: C:\Program Files\Winamp\winamp.exe
(0000000000960000 - 000000000096a000: C:\Program Files\Winamp\Plugins\in_mp4.dll
(0000000000a50000 - 0000000000a67000: C:\Program Files\Winamp\Plugins\in_dshow.dll
(0000000000a70000 - 0000000000a8d000: C:\Program Files\Winamp\Plugins\in_midi.dll
(0000000000a90000 - 0000000000aab000: C:\Program Files\Winamp\Plugins\read_file.dll
(0000000000ab0000 - 0000000000ade000: C:\Program Files\Winamp\Plugins\in_mod.dll
(0000000000ae0000 - 0000000000b9f000: C:\Program Files\Winamp\Plugins\in_mp3.dll
(0000000000be0000 - 0000000000c1f000: C:\Program Files\Winamp\Plugins\in_nsv.dll
(0000000000c20000 - 0000000000c5c000: C:\Program Files\Winamp\Plugins\in_vorbis.dll
(0000000000c60000 - 0000000000c6b000: C:\Program Files\Winamp\Plugins\in_wave.dll
(0000000000c70000 - 0000000000c96000: C:\Program Files\Winamp\Plugins\in_wm.dll
(0000000000ca0000 - 0000000000ca8000: C:\Program Files\Winamp\Plugins\out_disk.dll
(0000000000cb0000 - 0000000000cbe000: C:\Program Files\Winamp\Plugins\out_ds.dll
(0000000000cc0000 - 0000000000cc7000: C:\Program Files\Winamp\Plugins\out_wave.dll
(0000000001090000 - 00000000010b0000: C:\Program Files\Winamp\Plugins\freeform\wacs\jpgload\jpgload.wac
(0000000001130000 - 0000000001138000: C:\Program Files\Winamp\Plugins\gen_hotkeys.dll
(0000000001140000 - 0000000001158000: C:\Program Files\Winamp\Plugins\gen_jumpex.dll
(0000000001270000 - 00000000014a7000: C:\Program Files\Winamp\Plugins\gen_ff.dll
(0000000001c20000 - 0000000001c27000: C:\Program Files\Winamp\Plugins\gen_tray.dll
(0000000001c50000 - 0000000001cba000: C:\Program Files\Winamp\Plugins\gen_ml.dll
(0000000001cd0000 - 0000000001d4f000: C:\Program Files\Winamp\Plugins\gen_sripper.dll
(0000000010000000 - 0000000010032000: C:\Program Files\Winamp\Plugins\in_cdda.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005edd0000 - 000000005ede7000: C:\WINDOWS\system32\OLEPRO32.DLL
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\system32\mswsock.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(0000000073760000 - 00000000737a9000: C:\WINDOWS\system32\ddraw.dll
(0000000073bc0000 - 0000000073bc6000: C:\WINDOWS\system32\DCIMAN32.dll
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg32.dll
(0000000076780000 - 0000000076789000: C:\WINDOWS\system32\SHFolder.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\X86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\COMCTL32.dll
(00000000774e0000 - 000000007761c000: C:\WINDOWS\system32\ole32.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d4000: C:\WINDOWS\system32\SHELL32.dll

*----> State Dump for Thread Id 0xed8 <----*

eax=023b62c8 ebx=00000000 ecx=00000000 edx=95220024 esi=023b62c8 edi=00000000
eip=01c5869d esp=0012be90 ebp=023cf920 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00200246

*** WARNING: Unable to verify checksum for C:\Program Files\Winamp\Plugins\gen_ml.dll
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Winamp\Plugins\gen_ml.dll -
function: gen_ml
        01c5868a 54               push    esp
        01c5868b 240c             and     al,0xc
        01c5868d 51               push    ecx
        01c5868e 52               push    edx
        01c5868f 57               push    edi
        01c58690 8bc8             mov     ecx,eax
        01c58692 e8b9ddffff       call    gen_ml+0x6450 (01c56450)
        01c58697 8bf0             mov     esi,eax
        01c58699 eb02             jmp     gen_ml+0x869d (01c5869d)
        01c5869b 33f6             xor     esi,esi
FAULT ->01c5869d 8b4728           mov     eax,[edi+0x28]    ds:0023:00000028=????????
        01c586a0 85c0             test    eax,eax
        01c586a2 7406             jz      gen_ml+0x86aa (01c586aa)
        01c586a4 8b4024           mov     eax,[eax+0x24]
        01c586a7 894624           mov     [esi+0x24],eax
        01c586aa 8b4f2c           mov     ecx,[edi+0x2c]
        01c586ad 6a01             push    0x1
        01c586af 56               push    esi
        01c586b0 e81bc6ffff       call    gen_ml+0x4cd0 (01c54cd0)
        01c586b5 8bc6             mov     eax,esi
        01c586b7 5f               pop     edi

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
023cf920 6d75636f 73746e65 646e6120 74655320 gen_ml+0x869d
445c3a43 00000000 00000000 00000000 00000000 0x6d75636f

*----> Raw Stack Dump <----*
000000000012be90  91 1f 00 00 00 00 00 00 - 6c 86 c5 01 00 00 00 00  ........l.......
000000000012bea0  00 00 00 00 a8 64 c9 01 - 00 00 00 00 91 1f 00 00  .....d..........
000000000012beb0  13 01 00 00 00 00 00 00 - 00 00 00 00 02 00 00 00  ................
000000000012bec0  00 00 00 00 0c bf 12 00 - 10 bf 12 00 18 ee 90 7c  ...............|
000000000012bed0  70 05 91 7c ff ff ff ff - 6d 05 91 7c 10 bf 12 00  p..|....m..|....
000000000012bee0  00 00 94 00 32 07 91 7c - 00 00 00 00 68 4a 69 00  ....2..|....hJi.
000000000012bef0  0c bf 12 00 fe 8a d4 77 - 68 4a 69 00 f0 ff ff ff  .......whJi.....
000000000012bf00  01 00 00 00 00 00 00 00 - a0 f8 71 01 44 bf 12 00  ..........q.D...
000000000012bf10  a7 94 d4 77 68 4a 69 00 - f0 ff ff ff b0 94 d4 77  ...whJi........w
000000000012bf20  00 00 00 00 a0 f8 71 01 - 08 80 13 02 20 bf 12 00  ......q..... ...
000000000012bf30  00 00 00 00 70 d2 12 00 - 94 04 d7 77 b8 94 d4 77  ....p......w...w
000000000012bf40  ff ff ff ff b0 94 d4 77 - 3a d3 2a 01 06 02 11 00  .......w:.*.....
000000000012bf50  f0 ff ff ff 92 c0 29 01 - 06 02 11 00 f0 5f 6a 01  ......)......_j.
000000000012bf60  d2 d2 28 01 01 00 00 00 - 00 00 00 00 f0 5f 6a 01  ..(.........._j.
000000000012bf70  08 80 13 02 94 bf 12 00 - a9 b8 28 01 f5 01 00 00  ..........(.....
000000000012bf80  8c bf 12 00 90 bf 12 00 - 01 00 00 00 01 00 00 00  ................
000000000012bf90  9c bf 12 00 b8 bf 12 00 - d5 c0 29 01 00 00 00 00  ..........).....
000000000012bfa0  a0 26 8f 01 d2 d2 28 01 - 01 00 00 00 00 00 00 00  .&....(.........
000000000012bfb0  a0 26 8f 01 08 80 13 02 - d8 bf 12 00 a9 b8 28 01  .&............(.
000000000012bfc0  f5 01 00 00 d0 bf 12 00 - d4 bf 12 00 01 00 00 00  ................

*----> State Dump for Thread Id 0xca0 <----*

eax=7ffdb000 ebx=00000000 ecx=77e7a2e6 edx=7c90eb94 esi=001530a0 edi=00000100
eip=7c90eb94 esp=00f8fe1c ebp=00f8ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr  Args to Child              
00f8ff80 77e76c22 00f8ffa8 77e76a3b 001530a0 ntdll!KiFastSystemCallRet
00f8ff88 77e76a3b 001530a0 00000000 0012ce18 RPCRT4!I_RpcBCacheFree+0x5ea
00f8ffa8 77e76c0a 001b6e40 00f8ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
00f8ffb4 7c80b50b 001bc250 00000000 0012ce18 RPCRT4!I_RpcBCacheFree+0x5d2
00f8ffec 00000000 77e76bf0 001bc250 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000f8fe1c  99 e3 90 7c 03 67 e7 77 - 50 01 00 00 70 ff f8 00  ...|.g.wP...p...
0000000000f8fe2c  00 00 00 00 18 01 1c 00 - 54 ff f8 00 c0 9e 4d 80  ........T.....M.
0000000000f8fe3c  02 00 00 00 00 00 00 00 - 02 00 00 00 18 a1 4e 80  ..............N.
0000000000f8fe4c  02 00 00 00 02 00 00 00 - 00 00 df ff 02 ff 1f c0  ................
0000000000f8fe5c  46 89 4e 80 00 80 fd 7f - 8c fb f5 a9 60 ff 1f c0  F.N.........`...
0000000000f8fe6c  07 00 00 00 13 ae 4e 80 - 00 70 fd 7f 01 00 00 00  ......N..p......
0000000000f8fe7c  00 00 00 00 5c ff 1f c0 - 00 00 00 00 fc 07 30 c0  ....\.........0.
0000000000f8fe8c  24 fc f5 a9 6a fc 4e 80 - 8c fb f5 a9 00 00 00 00  $...j.N.........
0000000000f8fe9c  00 00 00 00 80 c5 c0 82 - 30 98 41 82 01 98 41 82  ........0.A...A.
0000000000f8feac  00 00 00 00 5c ff 1f c0 - 01 00 00 00 01 00 00 00  ....\...........
0000000000f8febc  a0 fb f5 a9 fe a0 4e 80 - 3e a1 4e 80 f0 2b 00 00  ......N.>.N..+..
0000000000f8fecc  d8 fb f5 a9 01 00 00 00 - c0 fb f5 a9 40 bb 00 00  ............@...
0000000000f8fedc  14 f8 f5 a9 28 f7 f5 a9 - 10 fd f5 a9 95 32 4e 80  ....(........2N.
0000000000f8feec  00 70 fd 7f ff ff ff ff - 30 fc f5 a9 98 e9 4d 80  .p......0.....M.
0000000000f8fefc  dc fb f5 a9 00 00 00 00 - 20 40 02 82 01 00 00 00  ........ @......
0000000000f8ff0c  a8 ef d0 82 01 00 00 00 - a8 ef d0 82 38 f5 df ff  ............8...
0000000000f8ff1c  8b cc 4d 80 00 60 26 82 - 4f ca 4d 80 8c 61 26 82  ..M..`&.O.M..a&.
0000000000f8ff2c  20 60 26 82 80 ff f8 00 - 99 66 e7 77 4c ff f8 00   `&......f.wL...
0000000000f8ff3c  a9 66 e7 77 ed 10 90 7c - d0 bb 1b 00 50 c2 1b 00  .f.w...|....P...
0000000000f8ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0xb40 <----*

eax=774f319a ebx=00007530 ecx=7ffde000 edx=00000000 esi=00000000 edi=0108ff50
eip=7c90eb94 esp=0108ff20 ebp=0108ff78 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000206

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr  Args to Child              
0108ff78 7c802451 0000ea60 00000000 0108ffb4 ntdll!KiFastSystemCallRet
0108ff88 774f2fcb 0000ea60 001be7d0 774f314d kernel32!Sleep+0xf
0108ffb4 7c80b50b 001be7d0 7c910945 00150178 ole32!StringFromGUID2+0x2d1
0108ffec 00000000 774f319a 001be7d0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000108ff20  5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff 08 01  \..|.#.|....P...
000000000108ff30  50 25 80 7c f0 56 60 77 - 30 75 00 00 14 00 00 00  P%.|.V`w0u......
000000000108ff40  01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00  ................
000000000108ff50  00 ba 3c dc ff ff ff ff - 08 4f 4e 77 50 ff 08 01  ..<......ONwP...
000000000108ff60  30 ff 08 01 e0 04 1c 00 - dc ff 08 01 f3 99 83 7c  0..............|
000000000108ff70  58 24 80 7c 00 00 00 00 - 88 ff 08 01 51 24 80 7c  X$.|........Q$.|
000000000108ff80  60 ea 00 00 00 00 00 00 - b4 ff 08 01 cb 2f 4f 77  `............/Ow
000000000108ff90  60 ea 00 00 d0 e7 1b 00 - 4d 31 4f 77 00 00 00 00  `.......M1Ow....
000000000108ffa0  45 09 91 7c d0 e7 1b 00 - 00 00 4e 77 b5 31 4f 77  E..|......Nw.1Ow
000000000108ffb0  78 01 15 00 ec ff 08 01 - 0b b5 80 7c d0 e7 1b 00  x..........|....
000000000108ffc0  45 09 91 7c 78 01 15 00 - d0 e7 1b 00 00 a0 fd 7f  E..|x...........
000000000108ffd0  00 06 fc 82 c0 ff 08 01 - 18 a8 64 82 ff ff ff ff  ..........d.....
000000000108ffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
000000000108fff0  00 00 00 00 9a 31 4f 77 - d0 e7 1b 00 00 00 00 00  .....1Ow........
0000000001090000  4d 5a 90 00 03 00 00 00 - 04 00 00 00 ff ff 00 00  MZ..............
0000000001090010  b8 00 00 00 00 00 00 00 - 40 00 00 00 00 00 00 00  ........@.......
0000000001090020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001090030  00 00 00 00 00 00 00 00 - 00 00 00 00 d8 00 00 00  ................
0000000001090040  0e 1f ba 0e 00 b4 09 cd - 21 b8 01 4c cd 21 54 68  ........!..L.!Th
0000000001090050  69 73 20 70 72 6f 67 72 - 61 6d 20 63 61 6e 6e 6f  is program canno

*----> State Dump for Thread Id 0x6a4 <----*

eax=001c1220 ebx=00000000 ecx=7ffd9000 edx=001b6e40 esi=001530a0 edi=00000100
eip=7c90eb94 esp=0126fe1c ebp=0126ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0126ff80 77e76c22 0126ffa8 77e76a3b 001530a0 ntdll!KiFastSystemCallRet
0126ff88 77e76a3b 001530a0 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea
0126ffa8 77e76c0a 001b6e40 0126ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0126ffb4 7c80b50b 001c0248 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2
0126ffec 00000000 77e76bf0 001c0248 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000126fe1c  99 e3 90 7c 03 67 e7 77 - 50 01 00 00 70 ff 26 01  ...|.g.wP...p.&.
000000000126fe2c  00 00 00 00 a8 15 1c 00 - 54 ff 26 01 00 00 00 f6  ........T.&.....
000000000126fe3c  44 24 08 01 74 07 56 e8 - e2 88 e8 ff 59 8b c6 5e  D$..t.V.....Y..^
000000000126fe4c  c2 04 00 56 02 f1 c7 06 - 00 00 c8 30 e8 0c 00 00  ...V.......0....
000000000126fe5c  00 83 66 04 00 c7 06 68 - cb c8 30 5e c3 56 8b f1  ..f....h..0^.V..
000000000126fe6c  06 00 00 00 00 8b 46 08 - 83 f8 ff 74 0b 50 ff 15  ......F....t.P..
000000000126fe7c  18 18 b0 30 83 4e 08 ff - 5e c3 90 90 8a 3a d8 30  ...0.N..^....:.0
000000000126fe8c  d1 49 b1 30 a4 cb c8 30 - f3 6e 1a 31 f3 6e 1a 31  .I.0...0.n.1.n.1
000000000126fe9c  f3 6e 1a 31 f3 6e 1a 31 - f3 6e 1a 31 f3 6e 1a 31  .n.1.n.1.n.1.n.1
000000000126feac  f3 6e 1a 31 f3 6e 1a 31 - f3 6e 1a 31 f3 6e 1a 31  .n.1.n.1.n.1.n.1
000000000126febc  f3 6e 1a 31 e0 42 0d 31 - 8b 4c 24 04 ff 49 04 8b  .n.1.B.1.L$..I..
000000000126fecc  41 04 0f 84 4d ff ff ff - c2 04 00 c2 04 00 90 90  A...M...........
000000000126fedc  8a 3a d8 30 d1 49 b1 30 - a4 cb c8 30 f3 33 cd 30  .:.0.I.0...0.3.0
000000000126feec  1f c8 c8 30 a4 5c cd 30 - 58 a4 cd 30 72 22 cd 30  ...0.\.0X..0r".0
000000000126fefc  fc 83 cd 30 2b 9b 1b 31 - 1b 60 1b 31 1b 60 1b 31  ...0+..1.`.1.`.1
000000000126ff0c  32 32 cd 30 33 9b 1b 31 - 13 cb c8 30 38 b5 95 f8  22.03..1...08...
000000000126ff1c  8b cc 4d 80 00 60 f3 81 - 4f ca 4d 80 8c 61 f3 81  ..M..`..O.M..a..
000000000126ff2c  20 60 f3 81 80 ff 26 01 - 99 66 e7 77 4c ff 26 01   `....&..f.wL.&.
000000000126ff3c  a9 66 e7 77 ed 10 90 7c - 20 02 1c 00 48 02 1c 00  .f.w...| ...H...
000000000126ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0xd1c <----*

eax=03b4ff54 ebx=00468e70 ecx=03b4ff38 edx=7c90eb94 esi=00000000 edi=03b4ff68
eip=7c90eb94 esp=03b4ff38 ebp=03b4ff90 iopl=0         nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000202

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for C:\Program Files\Winamp\winamp.exe
*** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\Winamp\winamp.exe
ChildEBP RetAddr  Args to Child              
03b4ff90 7c802451 00000010 00000000 7c802442 ntdll!KiFastSystemCallRet
03b4ffa0 0043b7b3 00000010 006f0054 00690078 kernel32!Sleep+0xf
7c802442 ff006aec 4be80875 5dffffff 900004c2 winamp+0x3b7b3
8b55ff8b 00000000 00000000 00000000 00000000 0xff006aec

*----> Raw Stack Dump <----*
0000000003b4ff38  5c d8 90 7c ed 23 80 7c - 00 00 00 00 68 ff b4 03  \..|.#.|....h...
0000000003b4ff48  01 00 00 00 01 00 00 00 - 70 8e 46 00 14 00 00 00  ........p.F.....
0000000003b4ff58  01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00  ................
0000000003b4ff68  00 8f fd ff ff ff ff ff - 00 00 00 00 68 ff b4 03  ............h...
0000000003b4ff78  48 ff b4 03 50 0d 08 aa - dc ff b4 03 f3 99 83 7c  H...P..........|
0000000003b4ff88  58 24 80 7c 00 00 00 00 - a0 ff b4 03 51 24 80 7c  X$.|........Q$.|
0000000003b4ff98  10 00 00 00 00 00 00 00 - 42 24 80 7c b3 b7 43 00  ........B$.|..C.
0000000003b4ffa8  10 00 00 00 54 00 6f 00 - 78 00 69 00 ec ff b4 03  ....T.o.x.i.....
0000000003b4ffb8  0b b5 80 7c 70 8e 46 00 - 54 00 6f 00 78 00 69 00  ...|p.F.T.o.x.i.
0000000003b4ffc8  70 8e 46 00 00 80 fd 7f - 00 26 fc 82 c0 ff b4 03  p.F......&......
0000000003b4ffd8  f0 bb df 82 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  ...........|...|
0000000003b4ffe8  00 00 00 00 00 00 00 00 - 00 00 00 00 d0 b6 43 00  ..............C.
0000000003b4fff8  70 8e 46 00 00 00 00 00 - 00 00 00 00 00 00 00 00  p.F.............
0000000003b50008  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003b50018  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003b50028  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003b50038  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003b50048  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003b50058  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003b50068  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x854 <----*

eax=02472e70 ebx=00000360 ecx=0246f170 edx=0000000c esi=02472e70 edi=02472e74
eip=00aee1c5 esp=03c19850 ebp=0246f0e0 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000206

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Winamp\Plugins\in_mp3.dll -
function: in_mp3
        00aee1b0 40               inc     eax
        00aee1b1 08d8             or      al,bl
        00aee1b3 60               pushad
        00aee1b4 28d8             sub     al,bl
        00aee1b6 60               pushad
        00aee1b7 38d8             cmp     al,bl
        00aee1b9 0dd08bb200       or      eax,0xb28bd0
        00aee1be d9c0             fld     st(0)
        00aee1c0 d8c2             fadd    st,st(2)
        00aee1c2 d95904           fstp    dword ptr [ecx+0x4]
        00aee1c5 d9c9             fxch    st(1)
        00aee1c7 d8e1             fsub    st,st(1)
        00aee1c9 d9591c           fstp    dword ptr [ecx+0x1c]
        00aee1cc ddd8             fstp    st(0)
        00aee1ce d905e48bb200     fld     dword ptr [in_mp3+0x48be4 (00b28be4)]
        00aee1d4 d84840           fmul    dword ptr [eax+0x40]
        00aee1d7 d905d48bb200     fld     dword ptr [in_mp3+0x48bd4 (00b28bd4)]
        00aee1dd d84820           fmul    dword ptr [eax+0x20]
        00aee1e0 dec1             faddp   st(1),st
        00aee1e2 d905dc8bb200     fld     dword ptr [in_mp3+0x48bdc (00b28bdc)]
        00aee1e8 d84830           fmul    dword ptr [eax+0x30]

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0246f0e0 00000000 00000000 00000000 00000000 in_mp3+0xe1c5

*----> Raw Stack Dump <----*
0000000003c19850  96 de ae 00 70 2e 47 02 - 70 f1 46 02 10 2b 47 02  ....p.G.p.F..+G.
0000000003c19860  40 14 47 02 c8 f0 46 02 - 00 00 00 00 00 00 00 00  @.G...F.........
0000000003c19870  0c 00 00 00 02 00 00 00 - 1b 00 00 00 d4 13 47 02  ..............G.
0000000003c19880  2b 09 af 00 00 00 00 00 - 40 14 47 02 10 2b 47 02  +.......@.G..+G.
0000000003c19890  d4 13 47 02 28 14 47 02 - c8 f0 46 02 00 12 00 00  ..G.(.G...F.....
0000000003c198a0  40 14 47 02 00 00 00 00 - 02 00 00 00 00 16 47 02  @.G...........G.
0000000003c198b0  02 00 00 00 f6 06 af 00 - e4 54 b7 00 01 6c 00 00  .........T...l..
0000000003c198c0  b4 ff c4 03 00 00 00 00 - 08 f0 46 02 64 ff c4 03  ..........F.d...
0000000003c198d0  fc 13 47 02 1e 41 af 00 - e4 54 b7 00 01 6c 00 00  ..G..A...T...l..
0000000003c198e0  64 ff c4 03 00 00 00 00 - 00 12 00 00 01 00 00 00  d...............
0000000003c198f0  de ad ae 00 e4 54 b7 00 - 00 6c 00 00 64 ff c4 03  .....T...l..d...
0000000003c19900  65 00 79 00 20 00 53 00 - 00 00 00 00 ec 52 b2 00  e.y. .S......R..
0000000003c19910  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003c19920  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003c19930  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003c19940  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003c19950  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003c19960  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003c19970  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003c19980  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xd24 <----*

eax=72d230e8 ebx=01f2fef8 ecx=00000063 edx=00162fd8 esi=00000000 edi=7ffde000
eip=7c90eb94 esp=01f2fed0 ebp=01f2ff6c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv -
ChildEBP RetAddr  Args to Child              
01f2ff6c 7c809c86 00000002 01f2ffa4 00000000 ntdll!KiFastSystemCallRet
01f2ff88 72d2312a 00000002 01f2ffa4 00000000 kernel32!WaitForMultipleObjects+0x18
01f2ffb4 7c80b50b 00000000 00000000 00150000 wdmaud!midMessage+0x348
01f2ffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001f2fed0  ab e9 90 7c f2 94 80 7c - 02 00 00 00 f8 fe f2 01  ...|...|........
0000000001f2fee0  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001f2fef0  00 00 00 00 00 00 00 00 - 08 02 00 00 e4 01 00 00  ................
0000000001f2ff00  00 00 00 00 00 00 00 00 - 78 70 61 80 02 00 00 00  ........xpa.....
0000000001f2ff10  01 00 00 00 00 00 ff 7f - 14 00 00 00 01 00 00 00  ................
0000000001f2ff20  00 00 00 00 00 00 00 00 - 10 00 00 00 c8 63 26 82  .............c&.
0000000001f2ff30  fc 63 26 82 00 00 00 00 - 00 e0 fd 7f 00 60 fd 7f  .c&..........`..
0000000001f2ff40  c8 63 26 82 00 00 00 00 - f8 fe f2 01 9c bb 4f 80  .c&...........O.
0000000001f2ff50  02 00 00 00 ec fe f2 01 - 00 00 00 00 dc ff f2 01  ................
0000000001f2ff60  f3 99 83 7c 90 95 80 7c - 00 00 00 00 88 ff f2 01  ...|...|........
0000000001f2ff70  86 9c 80 7c 02 00 00 00 - a4 ff f2 01 00 00 00 00  ...|............
0000000001f2ff80  ff ff ff ff 00 00 00 00 - b4 ff f2 01 2a 31 d2 72  ............*1.r
0000000001f2ff90  02 00 00 00 a4 ff f2 01 - 00 00 00 00 ff ff ff ff  ................
0000000001f2ffa0  00 00 15 00 08 02 00 00 - e4 01 00 00 f2 3e 70 80  .............>p.
0000000001f2ffb0  dc e2 90 7c ec ff f2 01 - 0b b5 80 7c 00 00 00 00  ...|.......|....
0000000001f2ffc0  00 00 00 00 00 00 15 00 - 00 00 00 00 00 60 fd 7f  .............`..
0000000001f2ffd0  00 06 fc 82 c0 ff f2 01 - 70 cb 7b 82 ff ff ff ff  ........p.{.....
0000000001f2ffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
0000000001f2fff0  00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00  .....0.r........
0000000001f30000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xecc <----*

eax=72d2457b ebx=7c9010ed ecx=03c18fc0 edx=7c9153f5 esi=000002e0 edi=00000000
eip=7c90eb94 esp=03f8ff20 ebp=03f8ff84 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
03f8ff84 7c802542 000002e0 ffffffff 00000000 ntdll!KiFastSystemCallRet
03f8ff98 72d245e9 000002e0 ffffffff 001310a0 kernel32!WaitForSingleObject+0x12
03f8ffb4 7c80b50b 000002e0 001310a0 00000000 wdmaud!mxdMessage+0x129c
03f8ffec 00000000 72d2457b 001652c8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000003f8ff20  c0 e9 90 7c db 25 80 7c - e0 02 00 00 00 00 00 00  ...|.%.|........
0000000003f8ff30  00 00 00 00 05 10 90 7c - c8 52 16 00 ed 10 90 7c  .......|.R.....|
0000000003f8ff40  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003f8ff50  10 00 00 00 ed 10 90 7c - 00 70 16 00 00 e0 fd 7f  .......|.p......
0000000003f8ff60  00 50 fd 7f 00 00 00 00 - dc ff f8 03 34 ff f8 03  .P..........4...
0000000003f8ff70  90 9f 80 7c dc ff f8 03 - f3 99 83 7c 08 26 80 7c  ...|.......|.&.|
0000000003f8ff80  00 00 00 00 98 ff f8 03 - 42 25 80 7c e0 02 00 00  ........B%.|....
0000000003f8ff90  ff ff ff ff 00 00 00 00 - b4 ff f8 03 e9 45 d2 72  .............E.r
0000000003f8ffa0  e0 02 00 00 ff ff ff ff - a0 10 13 00 00 00 00 00  ................
0000000003f8ffb0  c8 52 16 00 ec ff f8 03 - 0b b5 80 7c e0 02 00 00  .R.........|....
0000000003f8ffc0  a0 10 13 00 00 00 00 00 - c8 52 16 00 00 50 fd 7f  .........R...P..
0000000003f8ffd0  00 06 fc 82 c0 ff f8 03 - 30 fa e1 82 ff ff ff ff  ........0.......
0000000003f8ffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
0000000003f8fff0  00 00 00 00 7b 45 d2 72 - c8 52 16 00 00 00 00 00  ....{E.r.R......
0000000003f90000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003f90010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003f90020  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003f90030  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003f90040  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000003f90050  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xa48 <----*

eax=00000001 ebx=00005a00 ecx=76b42af8 edx=000000c8 esi=00000248 edi=00000000
eip=7c90eb94 esp=0408ff14 ebp=0408ff78 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Winamp\Plugins\out_wave.dll -
ChildEBP RetAddr  Args to Child              
0408ff78 7c802542 00000248 ffffffff 00000000 ntdll!KiFastSystemCallRet
0408ff8c 00cc1f66 00000248 ffffffff 7c910738 kernel32!WaitForSingleObject+0x12
00163fd8 00000218 00000248 001655f0 ffffffff out_wave+0x1f66

*----> Raw Stack Dump <----*
000000000408ff14  c0 e9 90 7c db 25 80 7c - 48 02 00 00 00 00 00 00  ...|.%.|H.......
000000000408ff24  00 00 00 00 00 00 00 00 - e4 3f 16 00 00 5a 00 00  .........?...Z..
000000000408ff34  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000408ff44  10 00 00 00 c2 55 b4 76 - 00 00 00 00 00 e0 fd 7f  .....U.v........
000000000408ff54  00 40 fd 7f 00 00 00 00 - 00 00 00 00 28 ff 08 04  .@..........(...
000000000408ff64  94 7d df 03 dc ff 08 04 - f3 99 83 7c 08 26 80 7c  .}.........|.&.|
000000000408ff74  00 00 00 00 8c ff 08 04 - 42 25 80 7c 48 02 00 00  ........B%.|H...
000000000408ff84  ff ff ff ff 00 00 00 00 - d8 3f 16 00 66 1f cc 00  .........?..f...
000000000408ff94  48 02 00 00 ff ff ff ff - 38 07 91 7c ff ff ff ff  H.......8..|....
000000000408ffa4  ec ff 08 04 d8 3f 16 00 - 00 00 00 00 b4 7b df 03  .....?.......{..
000000000408ffb4  31 1f cc 00 0b b5 80 7c - d8 3f 16 00 38 07 91 7c  1......|.?..8..|
000000000408ffc4  ff ff ff ff d8 3f 16 00 - 00 40 fd 7f 00 26 fc 82  .....?...@...&..
000000000408ffd4  c0 ff 08 04 30 fa e1 82 - ff ff ff ff f3 99 83 7c  ....0..........|
000000000408ffe4  18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00  ...|............
000000000408fff4  28 1f cc 00 d8 3f 16 00 - 00 00 00 00 00 00 00 00  (....?..........
0000000004090004  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000004090014  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000004090024  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000004090034  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000004090044  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................



Application exception occurred:
        App: C:\Program Files\Hewlett-Packard\hp LaserJet 1010 Series\SetConfig.exe (pid=1508)
        When: 2/13/2005 @ 16:11:59.875
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: DAKAHRABAH
        User Name: Owner
        Terminal Session Id: 0
        Number of Processors: 2
        Processor Type: x86 Family 15 Model 3 Stepping 4
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 2
        Current Type: Multiprocessor Free
        Registered Organization:
        Registered Owner:  

*----> Task List <----*
   0 System Process
   4 System
 728 smss.exe
 784 csrss.exe
 812 winlogon.exe
 856 services.exe
 868 lsass.exe
1032 svchost.exe
1100 svchost.exe
1196 svchost.exe
1288 svchost.exe
1360 svchost.exe
1568 spoolsv.exe
1736 ccSetMgr.exe
1796 mdm.exe
1828 navapsvc.exe
 240 Explorer.EXE
 280 svchost.exe
 332 wdfmgr.exe
 568 ccEvtMgr.exe
 596 SymWSC.exe
1260 ccApp.exe
1300 WkUFind.exe
1312 Athan.exe
1396 realsched.exe
1424 LVCOMSX.EXE
1444 StatusClient.exe
1508 SetConfig.exe
2192 alg.exe
2644 javaw.exe
2056 wuauclt.exe
 408 msmsgs.exe
3088 notepad.exe
3140 drwtsn32.exe

*----> Module List <----*
(0000000000400000 - 0000000000407000: C:\Program Files\Hewlett-Packard\hp LaserJet 1010 Series\SetConfig.exe
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000073dd0000 - 0000000073ece000: C:\WINDOWS\system32\MFC42.DLL
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\MSVCRT.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll

*----> State Dump for Thread Id 0x5ec <----*

eax=00322758 ebx=00000005 ecx=00000000 edx=00000000 esi=00322750 edi=00322750
eip=20646e61 esp=0012fe70 ebp=0012ffc0 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: <nosymbols>
No prior disassembly possible
        20646e61 ??               ???
        20646e63 ??               ???
        20646e65 ??               ???
        20646e67 ??               ???
        20646e69 ??               ???
        20646e6b ??               ???
        20646e6d ??               ???
        20646e6f ??               ???
        20646e71 ??               ???
FAULT ->*** WARNING: Unable to verify checksum for C:\Program Files\Hewlett-Packard\hp LaserJet 1010 Series\SetConfig.exe
*** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\Hewlett-Packard\hp LaserJet 1010 Series\SetConfig.exe
20646e61 ??               ???
Error 0x00000001
        20646e63 ??               ???
        20646e65 ??               ???
        20646e67 ??               ???
        20646e69 ??               ???
        20646e6b ??               ???
        20646e6d ??               ???
        20646e6f ??               ???
        20646e71 ??               ???
        20646e73 ??               ???
        20646e75 ??               ???

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0012fe6c 004011df 00000000 00000000 00000000 0x20646e61
0012ffc0 7c816d4f 00340039 00320030 7ffd5000 SetConfig+0x11df
0012fff0 00000000 00402d5e 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49

*----> Raw Stack Dump <----*
000000000012fe70  df 11 40 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ..@.............
000000000012fe80  00 00 00 00 00 00 00 00 - 58 27 32 00 50 27 32 00  ........X'2.P'2.
000000000012fe90  70 5c 40 00 ff ff ff ff - 94 5c c3 77 88 20 c1 77  p\@......\.w. .w
000000000012fea0  ff ff ff ff ce c3 c2 77 - e7 c3 c2 77 f8 fe 12 00  .......w...w....
000000000012feb0  d8 30 40 00 00 00 00 00 - e4 1b 40 00 00 00 00 00  .0@.......@.....
000000000012fec0  80 5c 32 00 ff ff ff ff - dc fe 12 00 70 5c 40 00  .\2.........p\@.
000000000012fed0  70 5c 40 00 c0 ff 12 00 - 60 5c 14 00 d4 86 ea 73  p\@.....`\.....s
000000000012fee0  58 36 14 00 06 d0 dd 73 - c0 fe 12 00 70 5c 40 00  X6.....s....p\@.
000000000012fef0  78 9c e6 73 57 cf dd 73 - b0 ff 12 00 f3 31 40 00  x..sW..s.....1@.
000000000012ff00  00 00 00 00 74 cf dd 73 - 39 00 34 00 11 23 14 00  ....t..s9.4..#..
000000000012ff10  00 00 00 00 4f 30 40 00 - 00 00 40 00 00 00 00 00  ....O0@...@.....
000000000012ff20  11 23 14 00 01 00 00 00 - 92 2e 40 00 00 00 40 00  .#........@...@.
000000000012ff30  00 00 00 00 11 23 14 00 - 01 00 00 00 39 00 34 00  .....#......9.4.
000000000012ff40  30 00 32 00 00 50 fd 7f - 05 00 00 c0 11 23 14 00  0.2..P.......#..
000000000012ff50  e0 25 32 00 00 00 00 00 - 00 00 00 00 d0 29 32 00  .%2..........)2.
000000000012ff60  0d 00 00 00 44 00 00 00 - 90 36 14 00 f0 36 14 00  ....D....6...6..
000000000012ff70  08 37 14 00 00 00 00 00 - 00 00 00 00 00 00 00 00  .7..............
000000000012ff80  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000012ff90  01 00 00 00 01 00 00 00 - 00 00 00 00 ff ff ff ff  ................
000000000012ffa0  ff ff ff ff ff ff ff ff - 3c ff 12 00 94 fa 12 00  ........<.......



Application exception occurred:
        App: C:\Program Files\Hewlett-Packard\hp LaserJet 1010 Series\SetConfig.exe (pid=1212)
        When: 2/16/2005 @ 11:12:15.703
        Exception number: c0000005 (access violation)

*----> System Information <----*
        Computer Name: DAKAHRABAH
        User Name: Owner
        Terminal Session Id: 1
        Number of Processors: 2
        Processor Type: x86 Family 15 Model 3 Stepping 4
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 2
        Current Type: Multiprocessor Free
        Registered Organization:
        Registered Owner:  

*----> Task List <----*
   0 System Process
   4 System
 760 smss.exe
 816 csrss.exe
 840 winlogon.exe
 884 services.exe
 896 lsass.exe
1068 svchost.exe
1136 svchost.exe
1232 svchost.exe
1328 svchost.exe
1396 svchost.exe
1604 spoolsv.exe
1748 ccSetMgr.exe
1808 mdm.exe
1844 navapsvc.exe
1984 svchost.exe
 148 wdfmgr.exe
 208 ccEvtMgr.exe
 268 SymWSC.exe
1004 alg.exe
1200 Explorer.EXE
1356 ccApp.exe
1992 WkUFind.exe
 408 Athan.exe
 400 realsched.exe
 388 LVCOMSX.EXE
 164 StatusClient.exe
1512 qttask.exe
1868 msmsgs.exe
1532 LogitechDesktopMessenger.exe
1684 msnmsgr.exe
2672 javaw.exe
2248 csrss.exe
4068 winlogon.exe
2484 Explorer.EXE
3332 ccApp.exe
1616 WkUFind.exe
1060 Athan.exe
 540 realsched.exe
3376 LVCOMSX.EXE
3028 StatusClient.exe
1212 SetConfig.exe
3520 WINWORD.EXE
1208 msiexec.exe
3276 msmsgs.exe
3032 drwtsn32.exe

*----> Module List <----*
(0000000000400000 - 0000000000407000: C:\Program Files\Hewlett-Packard\hp LaserJet 1010 Series\SetConfig.exe
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000073dd0000 - 0000000073ece000: C:\WINDOWS\system32\MFC42.DLL
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\MSVCRT.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll

*----> State Dump for Thread Id 0xc40 <----*

eax=00327398 ebx=00000005 ecx=00000000 edx=00000000 esi=00327390 edi=00327390
eip=00000000 esp=0012fe70 ebp=0012ffc0 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

*** WARNING: Unable to verify checksum for C:\Program Files\Hewlett-Packard\hp LaserJet 1010 Series\SetConfig.exe
*** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\Hewlett-Packard\hp LaserJet 1010 Series\SetConfig.exe
function: <nosymbols>
No prior disassembly possible
        :
        00000000 ??               ???
        00000002 ??               ???
        00000004 ??               ???
        00000006 ??               ???
        00000008 ??               ???
        0000000a ??               ???
        0000000c ??               ???
        0000000e ??               ???
FAULT ->:
00000000 ??               ???
Error 0x00000001
        00000002 ??               ???
        00000004 ??               ???
        00000006 ??               ???
        00000008 ??               ???
        0000000a ??               ???
        0000000c ??               ???
        0000000e ??               ???
        00000010 ??               ???
        00000012 ??               ???
        00000014 ??               ???

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr  Args to Child              
0012fe6c 004011df 00000000 00000000 00000000 0x0
0012ffc0 7c816d4f 00340039 00320030 7ffd6000 SetConfig+0x11df
0012fff0 00000000 00402d5e 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49

*----> Raw Stack Dump <----*
000000000012fe70  df 11 40 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ..@.............
000000000012fe80  00 00 00 00 00 00 00 00 - 98 73 32 00 90 73 32 00  .........s2..s2.
000000000012fe90  70 5c 40 00 ff ff ff ff - 94 5c c3 77 88 20 c1 77  p\@......\.w. .w
000000000012fea0  ff ff ff ff ce c3 c2 77 - e7 c3 c2 77 f8 fe 12 00  .......w...w....
000000000012feb0  d8 30 40 00 00 00 00 00 - e4 1b 40 00 00 00 00 00  .0@.......@.....
000000000012fec0  e0 5f 32 00 ff ff ff ff - dc fe 12 00 70 5c 40 00  ._2.........p\@.
000000000012fed0  70 5c 40 00 c0 ff 12 00 - 70 5c 14 00 d4 86 ea 73  p\@.....p\.....s
000000000012fee0  68 36 14 00 06 d0 dd 73 - c0 fe 12 00 70 5c 40 00  h6.....s....p\@.
000000000012fef0  78 9c e6 73 57 cf dd 73 - b0 ff 12 00 f3 31 40 00  x..sW..s.....1@.
000000000012ff00  00 00 00 00 74 cf dd 73 - 39 00 34 00 11 23 14 00  ....t..s9.4..#..
000000000012ff10  00 00 00 00 4f 30 40 00 - 00 00 40 00 00 00 00 00  ....O0@...@.....
000000000012ff20  11 23 14 00 01 00 00 00 - 92 2e 40 00 00 00 40 00  .#........@...@.
000000000012ff30  00 00 00 00 11 23 14 00 - 01 00 00 00 39 00 34 00  .....#......9.4.
000000000012ff40  30 00 32 00 00 60 fd 7f - 05 00 00 c0 11 23 14 00  0.2..`.......#..
000000000012ff50  00 3a 32 00 00 00 00 00 - 80 69 67 ff b8 29 32 00  .:2......ig..)2.
000000000012ff60  0d 00 00 00 44 00 00 00 - a0 36 14 00 00 37 14 00  ....D....6...7..
000000000012ff70  18 37 14 00 00 00 00 00 - 00 00 00 00 00 00 00 00  .7..............
000000000012ff80  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000012ff90  01 00 00 00 01 00 00 00 - 00 00 00 00 ff ff ff ff  ................
000000000012ffa0  ff ff ff ff ff ff ff ff - 3c ff 12 00 94 fa 12 00  ........<.......



Application exception occurred:
        App: C:\Program Files\Windows Media Player\wmplayer.exe (pid=1120)
        When: 4/30/2005 @ 20:08:41.718
        Exception number: c000001e
()

*----> System Information <----*
        Computer Name: DAKAHRABAH
        User Name: Owner
        Terminal Session Id: 0
        Number of Processors: 2
        Processor Type: x86 Family 15 Model 3 Stepping 4
        Windows Version: 5.1
        Current Build: 2600
        Service Pack: 2
        Current Type: Multiprocessor Free
        Registered Organization:
        Registered Owner:  

*----> Task List <----*
   0 System Process
   4 System
 804 smss.exe
 860 csrss.exe
 884 winlogon.exe
 928 services.exe
 940 lsass.exe
1108 svchost.exe
1176 svchost.exe
1272 svchost.exe
1360 svchost.exe
1440 svchost.exe
1604 ccSetMgr.exe
1644 ccEvtMgr.exe
1828 spoolsv.exe
 636 mdm.exe
 664 navapsvc.exe
 864 SAVScan.exe
1256 svchost.exe
1336 wdfmgr.exe
1476 SymWSC.exe
 220 alg.exe
 172 Explorer.EXE
 340 Athan.exe
 560 ccApp.exe
 812 realsched.exe
1488 WkUFind.exe
2076 ViewMgr.exe
2120 ctfmon.exe
3296 realplay.exe
2044 ALCWZRD.EXE
 236 ntvdm.exe
2720 winamp.exe
4056 WISPTIS.EXE
2868 Joiner.exe
1120 wmplayer.exe
2664 msmsgs.exe
3520 drwtsn32.exe

*----> Module List <----*
(00000000009c0000 - 00000000009e0000: C:\Program Files\Common Files\Symantec Shared\Script Blocking\ScrBlock.dll
(0000000001000000 - 0000000001012000: C:\Program Files\Windows Media Player\wmplayer.exe
(0000000001630000 - 00000000018f6000: C:\WINDOWS\system32\msi.dll
(0000000001b20000 - 0000000001b62000: C:\Program Files\Common Files\Roxio Shared\SharedCOM\RoxioMPEGDemuxer.dll
(0000000001db0000 - 0000000001e06000: C:\Program Files\Common Files\Roxio Shared\SharedCOM\RoxioDVDAudio.dll
(0000000002060000 - 0000000002091000: C:\WINDOWS\system32\Mpeg2Decoder.ax
(00000000020a0000 - 0000000002172000: C:\Program Files\Common Files\Roxio Shared\SharedCOM\MPEG2VidCodec.dll
(00000000070d0000 - 000000000710b000: C:\WINDOWS\system32\WMASF.DLL
(0000000007510000 - 0000000007a5d000: C:\WINDOWS\system32\wmp.dll
(0000000008260000 - 0000000008597000: C:\WINDOWS\system32\wmploc.dll
(00000000086c0000 - 0000000008904000: C:\WINDOWS\system32\WMVCore.DLL
(0000000008af0000 - 0000000008b27000: C:\WINDOWS\system32\MsPMSP.dll
(0000000008b60000 - 0000000008baf000: C:\WINDOWS\system32\MSWMDM.dll
(0000000008bc0000 - 0000000008bcb000: C:\WINDOWS\system32\WMDMLOG.dll
(0000000008be0000 - 0000000008beb000: C:\WINDOWS\system32\WMDMPS.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 000000001001e000: C:\Program Files\Common Files\Symantec Shared\Script Blocking\scrauth.dll
(000000001c400000 - 000000001c528000: C:\Program Files\CyberLink\Shared Files\AudioFilter\claud.ax
(000000001d1c0000 - 000000001d27a000: C:\WINDOWS\system32\iviaudio.ax
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(000000004ec50000 - 000000004edf3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\netapi32.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\system32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\wsock32.dll
(00000000722b0000 - 00000000722b5000: C:\WINDOWS\system32\sensapi.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(00000000736b0000 - 00000000736b7000: C:\WINDOWS\system32\msdmo.dll
(0000000073760000 - 00000000737a9000: C:\WINDOWS\system32\DDRAW.dll
(0000000073940000 - 0000000073a10000: C:\WINDOWS\system32\D3DIM700.DLL
(0000000073bc0000 - 0000000073bc6000: C:\WINDOWS\system32\DCIMAN32.dll
(0000000073ee0000 - 0000000073ee4000: C:\WINDOWS\system32\KsUser.dll
(0000000073f10000 - 0000000073f6c000: C:\WINDOWS\system32\DSOUND.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.dll
(0000000074810000 - 000000007497d000: C:\WINDOWS\System32\quartz.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(0000000075a70000 - 0000000075a91000: C:\WINDOWS\system32\MSVFW32.dll
(0000000075c50000 - 0000000075cbe000: c:\windows\system32\jscript.dll
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\mlang.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000075f40000 - 0000000075f51000: C:\WINDOWS\System32\devenum.dll
(0000000076080000 - 00000000760e5000: C:\WINDOWS\system32\MSVCP60.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\msimg32.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\userenv.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\wintrust.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.DLL
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: C:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(0000000077260000 - 00000000772fe000: C:\WINDOWS\system32\urlmon.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\X86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\COMCTL32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077760000 - 00000000778cc000: C:\WINDOWS\System32\shdocvw.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f56000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\secur32.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d4000: C:\WINDOWS\system32\SHELL32.dll

*----> State Dump for Thread Id 0x2d0 <----*

eax=0000005d ebx=0006c1dc ecx=0799822c edx=00001a66 esi=0006c1f8 edi=0006c1f8
eip=7c90eb94 esp=0006c180 ebp=0006c19c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00200246

*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\wmp.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\Windows Media Player\wmplayer.exe
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr  Args to Child              
0006c19c 07585e37 0006c1f8 00000000 00000000 ntdll!KiFastSystemCallRet
0006c1c8 0751d24e 07510000 07995658 00000000 wmp!Ordinal3000+0x692fa
0006fed0 0751cbe5 00020784 00000001 0772d1cd wmp!Ordinal3000+0x711
0006fef4 010013b3 01000000 00020784 00000001 wmp!Ordinal3000+0xa8
0006ffc0 7c816d4f 02e4db00 00000018 7ffdf000 wmplayer+0x13b3
0006fff0 00000000 010010c4 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49

*----> Raw Stack Dump <----*
000000000006c180  be 91 d4 77 f1 91 d4 77 - f8 c1 06 00 00 00 00 00  ...w...w........
000000000006c190  00 00 00 00 00 00 00 00 - 00 00 00 00 c8 c1 06 00  ................
000000000006c1a0  37 5e 58 07 f8 c1 06 00 - 00 00 00 00 00 00 00 00  7^X.............
000000000006c1b0  00 00 00 00 01 00 00 00 - 48 57 99 07 00 00 00 00  ........HW......
000000000006c1c0  00 00 00 00 01 00 00 00 - d0 fe 06 00 4e d2 51 07  ............N.Q.
000000000006c1d0  00 00 51 07 58 56 99 07 - 00 00 00 00 f8 d2 51 07  ..Q.XV........Q.
000000000006c1e0  f0 80 03 01 01 00 00 00 - 01 00 00 00 88 7b 77 00  .............{w.
000000000006c1f0  01 00 00 00 02 00 00 00 - d4 03 0e 00 13 01 00 00  ................
000000000006c200  04 00 00 00 00 00 00 00 - 47 67 1a 00 fa 01 00 00  ........Gg......
000000000006c210  5c 02 00 00 d5 07 05 00 - 00 00 01 00 01 00 08 00  \...............
000000000006c220  02 00 8c 00 f4 d2 51 07 - 00 00 00 00 32 00 00 00  ......Q.....2...
000000000006c230  32 00 00 00 5e 01 00 00 - 5e 01 00 00 00 00 00 00  2...^...^.......
000000000006c240  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000006c250  00 00 00 01 98 fb 5b 07 - 88 fb 5b 07 10 03 07 00  ......[...[.....
000000000006c260  58 c2 06 00 d0 02 00 00 - 00 00 00 00 48 59 09 00  X...........HY..
000000000006c270  00 00 00 00 3c b3 d4 77 - 00 00 00 00 00 00 00 00  ....<..w........
000000000006c280  00 00 00 00 09 03 39 00 - 84 fb 5b 07 80 fb 5b 07  ......9...[...[.
000000000006c290  08 fb 5b 07 ec fa 5b 07 - a8 81 77 00 dc fa 5b 07  ..[...[...w...[.
000000000006c2a0  c8 fa 5b 07 ac fa 5b 07 - 90 fa 5b 07 54 fa 5b 07  ..[...[...[.T.[.
000000000006c2b0  00 00 00 00 3c fa 5b 07 - 01 00 00 00 10 c3 77 00  ....<.[.......w.

*----> State Dump for Thread Id 0xe20 <----*

eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=00b6fcec ebp=00b6ffb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00b6ffb4 7c80b50b 00000000 00090000 00000000 ntdll!KiFastSystemCallRet
00b6ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000b6fcec  ab e9 90 7c d5 a0 92 7c - 14 00 00 00 30 fd b6 00  ...|...|....0...
0000000000b6fcfc  01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 09 00  ................
0000000000b6fd0c  00 00 00 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c  ...........|...|
0000000000b6fd1c  48 01 00 00 20 0e 00 00 - 14 00 00 00 14 00 00 00  H... ...........
0000000000b6fd2c  13 00 00 00 40 01 00 00 - 1c 01 00 00 84 01 00 00  ....@...........
0000000000b6fd3c  94 01 00 00 b0 01 00 00 - bc 01 00 00 c8 01 00 00  ................
0000000000b6fd4c  20 02 00 00 24 02 00 00 - 2c 02 00 00 38 02 00 00   ...$...,...8...
0000000000b6fd5c  40 02 00 00 4c 02 00 00 - 58 02 00 00 64 02 00 00  @...L...X...d...
0000000000b6fd6c  6c 02 00 00 78 02 00 00 - 84 02 00 00 90 02 00 00  l...x...........
0000000000b6fd7c  98 02 00 00 b4 02 00 00 - c0 02 00 00 cc 02 00 00  ................
0000000000b6fd8c  d8 02 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000b6fd9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000b6fdac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000b6fdbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000b6fdcc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000b6fddc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000b6fdec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000b6fdfc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000b6fe0c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000b6fe1c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x8a0 <----*

eax=0000000c ebx=00bafef4 ecx=00baf5b8 edx=00000000 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=00bafecc ebp=00baff68 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\userenv.dll -
ChildEBP RetAddr  Args to Child              
00baff68 7c809c86 00000003 76a60310 00000000 ntdll!KiFastSystemCallRet
00baff84 769c888d 00000003 76a60310 00000000 kernel32!WaitForMultipleObjects+0x18
00baffb4 7c80b50b 00000000 00000000 00000000 userenv!UnregisterGPNotification+0x15c
00baffec 00000000 769c8831 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000bafecc  ab e9 90 7c f2 94 80 7c - 03 00 00 00 f4 fe ba 00  ...|...|........
0000000000bafedc  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000bafeec  b8 03 a6 76 77 9b 80 7c - 98 01 00 00 9c 01 00 00  ...vw..|........
0000000000bafefc  a0 01 00 00 5c fe ba 00 - 6c ff ba 00 6c ff ba 00  ....\...l...l...
0000000000baff0c  18 ee 90 7c 70 05 91 7c - 14 00 00 00 01 00 00 00  ...|p..|........
0000000000baff1c  00 00 00 00 00 00 00 00 - 10 00 00 00 f6 1b 80 7c  ...............|
0000000000baff2c  00 00 00 00 00 00 00 00 - 00 f0 fd 7f 00 b0 fd 7f  ................
0000000000baff3c  80 6a 10 00 00 00 00 00 - f4 fe ba 00 00 00 00 00  .j..............
0000000000baff4c  03 00 00 00 e8 fe ba 00 - 00 00 00 00 dc ff ba 00  ................
0000000000baff5c  f3 99 83 7c 90 95 80 7c - 00 00 00 00 84 ff ba 00  ...|...|........
0000000000baff6c  86 9c 80 7c 03 00 00 00 - 10 03 a6 76 00 00 00 00  ...|.......v....
0000000000baff7c  ff ff ff ff 00 00 00 00 - b4 ff ba 00 8d 88 9c 76  ...............v
0000000000baff8c  03 00 00 00 10 03 a6 76 - 00 00 00 00 ff ff ff ff  .......v........
0000000000baff9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 9c 76  ...............v
0000000000baffac  03 00 00 00 00 00 00 00 - ec ff ba 00 0b b5 80 7c  ...............|
0000000000baffbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000baffcc  00 b0 fd 7f 00 06 fc 82 - c0 ff ba 00 f8 16 6d 82  ..............m.
0000000000baffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00  .......|...|....
0000000000baffec  00 00 00 00 00 00 00 00 - 31 88 9c 76 00 00 00 00  ........1..v....
0000000000bafffc  00 00 00 00 c8 00 00 00 - fb 01 00 00 ff ee ff ee  ................

*----> State Dump for Thread Id 0xc40 <----*

eax=00000000 ebx=00cefed0 ecx=7ffda000 edx=77e46540 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=00cefea8 ebp=00ceff44 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ADVAPI32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00ceff44 77df9b26 00000002 00ceff6c 00000000 ntdll!KiFastSystemCallRet
00ceffb4 7c80b50b 00000000 7c9140bb 00000000 ADVAPI32!RegDeleteKeyW+0x2a2
00ceffec 00000000 77df9981 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000cefea8  ab e9 90 7c f2 94 80 7c - 02 00 00 00 d0 fe ce 00  ...|...|........
0000000000cefeb8  01 00 00 00 01 00 00 00 - 04 ff ce 00 b0 30 bb 00  .............0..
0000000000cefec8  40 65 e4 77 00 10 00 00 - b8 02 00 00 c4 02 00 00  @e.w............
0000000000cefed8  c0 fe ce 00 00 00 00 00 - dc ff ce 00 f3 99 83 7c  ...............|
0000000000cefee8  c8 0c 81 7c 00 10 00 00 - 14 00 00 00 01 00 00 00  ...|............
0000000000cefef8  00 00 00 00 00 00 00 00 - 10 00 00 00 00 a2 2f 4d  ............../M
0000000000ceff08  ff ff ff ff 00 10 00 00 - 00 f0 fd 7f 00 a0 fd 7f  ................
0000000000ceff18  dc ff ce 00 04 ff ce 00 - d0 fe ce 00 06 00 00 00  ................
0000000000ceff28  02 00 00 00 c4 fe ce 00 - 06 00 00 00 dc ff ce 00  ................
0000000000ceff38  f3 99 83 7c 90 95 80 7c - 00 00 00 00 b4 ff ce 00  ...|...|........
0000000000ceff48  26 9b df 77 02 00 00 00 - 6c ff ce 00 00 00 00 00  &..w....l.......
0000000000ceff58  e0 93 04 00 01 00 00 00 - bb 40 91 7c 00 00 00 00  .........@.|....
0000000000ceff68  00 00 00 00 b8 02 00 00 - c4 02 00 00 00 10 00 00  ................
0000000000ceff78  b0 30 bb 00 00 00 00 00 - 00 10 00 00 b8 40 bb 00  .0...........@..
0000000000ceff88  a0 66 e4 77 20 00 00 00 - 80 66 e4 77 00 10 00 00  .f.w ....f.w....
0000000000ceff98  00 00 00 00 a0 66 e4 77 - b0 30 bb 00 80 66 e4 77  .....f.w.0...f.w
0000000000ceffa8  e5 03 00 00 00 10 00 00 - b8 40 bb 00 ec ff ce 00  .........@......
0000000000ceffb8  0b b5 80 7c 00 00 00 00 - bb 40 91 7c 00 00 00 00  ...|.....@.|....
0000000000ceffc8  00 00 00 00 00 a0 fd 7f - 0f 00 00 00 c0 ff ce 00  ................
0000000000ceffd8  50 3e b3 82 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  P>.........|...|

*----> State Dump for Thread Id 0xf70 <----*

eax=00000102 ebx=00000000 ecx=00e2fe1c edx=7c90eb94 esi=00105e48 edi=00105eec
eip=7c90eb94 esp=00e2fe1c ebp=00e2ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
00e2ff80 77e76c22 00e2ffa8 77e76a3b 00105e48 ntdll!KiFastSystemCallRet
00e2ff88 77e76a3b 00105e48 00000000 0006a448 RPCRT4!I_RpcBCacheFree+0x5ea
00e2ffa8 77e76c0a 000b9f78 00e2ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
00e2ffb4 7c80b50b 00117578 00000000 0006a448 RPCRT4!I_RpcBCacheFree+0x5d2
00e2ffec 00000000 77e76bf0 00117578 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000e2fe1c  99 e3 90 7c 03 67 e7 77 - a8 02 00 00 70 ff e2 00  ...|.g.w....p...
0000000000e2fe2c  00 00 00 00 18 f3 13 00 - 54 ff e2 00 00 00 00 00  ........T.......
0000000000e2fe3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e2fe4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e2fe5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e2fe6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e2fe7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e2fe8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e2fe9c  00 00 00 00 43 fd 6f 80 - 28 ec b9 f8 27 f4 6f 80  ....C.o.(...'.o.
0000000000e2feac  00 0d db ba 00 00 00 00 - 80 0c 29 82 88 ec b9 f8  ..........).....
0000000000e2febc  00 00 00 00 68 0d 29 82 - 01 00 00 00 a0 ec b9 f8  ....h.).........
0000000000e2fecc  90 d7 26 82 70 84 ad 82 - 40 f5 df ff 34 ca 4d 80  ..&.p...@...4.M.
0000000000e2fedc  02 02 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e2feec  00 00 00 00 ff ff ff ff - 40 35 96 f8 00 00 00 00  ........@5......
0000000000e2fefc  10 f4 6f 80 1c 0e 29 82 - 28 ec b9 f8 00 00 00 00  ..o...).(.......
0000000000e2ff0c  27 f4 6f 80 08 00 00 00 - 46 02 00 00 e8 1b 4e 80  '.o.....F.....N.
0000000000e2ff1c  f0 0c 29 82 80 0c 29 82 - 1e 1c 4e 80 ec 0d 29 82  ..)...)...N...).
0000000000e2ff2c  80 0c 29 82 80 ff e2 00 - 99 66 e7 77 4c ff e2 00  ..)......f.wL...
0000000000e2ff3c  a9 66 e7 77 ed 10 90 7c - 28 11 11 00 78 75 11 00  .f.w...|(...xu..
0000000000e2ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0x938 <----*

eax=774fd888 ebx=00007530 ecx=7ffdf000 edx=00000000 esi=00000000 edi=00e6ff50
eip=7c90eb94 esp=00e6ff20 ebp=00e6ff78 iopl=0         nv up ei pl nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000206

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr  Args to Child              
00e6ff78 7c802451 0000ea60 00000000 00e6ffb4 ntdll!KiFastSystemCallRet
00e6ff88 774fd6ae 0000ea60 00118a38 774fd83b kernel32!Sleep+0xf
00e6ffb4 7c80b50b 00118a38 00000000 7c91094e ole32!IsValidInterface+0x295
00e6ffec 00000000 774fd888 00118a38 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000000e6ff20  5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff e6 00  \..|.#.|....P...
0000000000e6ff30  50 25 80 7c f8 6d 60 77 - 30 75 00 00 14 00 00 00  P%.|.m`w0u......
0000000000e6ff40  01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00  ................
0000000000e6ff50  00 ba 3c dc ff ff ff ff - 00 d1 4e 77 50 ff e6 00  ..<.......NwP...
0000000000e6ff60  30 ff e6 00 80 6a 10 00 - dc ff e6 00 f3 99 83 7c  0....j.........|
0000000000e6ff70  58 24 80 7c 00 00 00 00 - 88 ff e6 00 51 24 80 7c  X$.|........Q$.|
0000000000e6ff80  60 ea 00 00 00 00 00 00 - b4 ff e6 00 ae d6 4f 77  `.............Ow
0000000000e6ff90  60 ea 00 00 38 8a 11 00 - 3b d8 4f 77 00 00 00 00  `...8...;.Ow....
0000000000e6ffa0  00 00 00 00 38 8a 11 00 - 00 00 4e 77 a3 d8 4f 77  ....8.....Nw..Ow
0000000000e6ffb0  4e 09 91 7c ec ff e6 00 - 0b b5 80 7c 38 8a 11 00  N..|.......|8...
0000000000e6ffc0  00 00 00 00 4e 09 91 7c - 38 8a 11 00 00 80 fd 7f  ....N..|8.......
0000000000e6ffd0  00 06 fc 82 c0 ff e6 00 - 38 f2 d3 82 ff ff ff ff  ........8.......
0000000000e6ffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
0000000000e6fff0  00 00 00 00 88 d8 4f 77 - 38 8a 11 00 00 00 00 00  ......Ow8.......
0000000000e70000  c8 00 00 00 0a 01 00 00 - ff ee ff ee 02 10 00 00  ................
0000000000e70010  00 00 00 00 00 fe 00 00 - 00 00 10 00 00 20 00 00  ............. ..
0000000000e70020  00 02 00 00 00 20 00 00 - 96 00 00 00 ff ef fd 7f  ..... ..........
0000000000e70030  0a 00 08 06 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000e70040  00 00 00 00 98 05 e7 00 - 0f 00 00 00 f8 ff ff ff  ................
0000000000e70050  50 00 e7 00 50 00 e7 00 - 40 06 e7 00 00 00 00 00  P...P...@.......

*----> State Dump for Thread Id 0xc28 <----*

eax=00000000 ebx=00000000 ecx=00105e48 edx=00001a42 esi=00105e48 edi=00105eec
eip=7c90eb94 esp=01a7fe1c ebp=01a7ff80 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01a7ff80 77e76c22 01a7ffa8 77e76a3b 00105e48 ntdll!KiFastSystemCallRet
01a7ff88 77e76a3b 00105e48 00000000 00d315e0 RPCRT4!I_RpcBCacheFree+0x5ea
01a7ffa8 77e76c0a 000b9f78 01a7ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
01a7ffb4 7c80b50b 0013eff8 00000000 00d315e0 RPCRT4!I_RpcBCacheFree+0x5d2
01a7ffec 00000000 77e76bf0 0013eff8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001a7fe1c  99 e3 90 7c 03 67 e7 77 - a8 02 00 00 70 ff a7 01  ...|.g.w....p...
0000000001a7fe2c  00 00 00 00 08 f2 13 00 - 54 ff a7 01 00 00 00 00  ........T.......
0000000001a7fe3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7fe4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7fe5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7fe6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7fe7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7fe8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7fe9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7feac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7febc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7fecc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7fedc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7feec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7fefc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001a7ff0c  00 00 00 00 00 00 00 00 - 00 00 00 00 38 35 96 f8  ............85..
0000000001a7ff1c  66 c7 4d 80 00 d4 22 82 - 2f c5 4d 80 ec d5 22 82  f.M..."./.M...".
0000000001a7ff2c  80 d4 22 82 80 ff a7 01 - 99 66 e7 77 4c ff a7 01  .."......f.wL...
0000000001a7ff3c  a9 66 e7 77 ed 10 90 7c - d8 ee 13 00 f8 ef 13 00  .f.w...|........
0000000001a7ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......

*----> State Dump for Thread Id 0x93c <----*

eax=7ffd6000 ebx=01abfe80 ecx=00000000 edx=00000022 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=01abfe58 ebp=01abfef4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01abfef4 77d495f9 00000002 01abff1c 00000000 ntdll!KiFastSystemCallRet
01abff50 77d496a8 00000001 0105b284 ffffffff USER32!GetLastInputInfo+0x105
01abff6c 076056a2 00000001 0105b284 00000000 USER32!MsgWaitForMultipleObjects+0x1f
01abffb4 7c80b50b 0105f3c8 7c913288 00000000 wmp!DllGetClassObject+0x6675b
01abffec 00000000 076055e4 0105f3c8 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001abfe58  ab e9 90 7c f2 94 80 7c - 02 00 00 00 80 fe ab 01  ...|...|........
0000000001abfe68  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001abfe78  02 00 00 00 00 00 00 00 - 2c 03 00 00 38 03 00 00  ........,...8...
0000000001abfe88  34 87 d4 77 00 00 00 00 - 13 01 00 00 92 7e 00 00  4..w.........~..
0000000001abfe98  b5 e2 19 00 d0 27 0c 02 - 14 00 00 00 01 00 00 00  .....'..........
0000000001abfea8  00 00 00 00 00 00 00 00 - 10 00 00 00 d9 8b d4 77  ...............w
0000000001abfeb8  00 60 fd 7f 18 ff ab 01 - 00 f0 fd 7f 00 60 fd 7f  .`...........`..
0000000001abfec8  6b 98 d4 77 00 00 00 00 - 80 fe ab 01 00 00 00 00  k..w............
0000000001abfed8  02 00 00 00 74 fe ab 01 - 00 00 00 00 dc ff ab 01  ....t...........
0000000001abfee8  f3 99 83 7c 90 95 80 7c - 00 00 00 00 50 ff ab 01  ...|...|....P...
0000000001abfef8  f9 95 d4 77 02 00 00 00 - 1c ff ab 01 00 00 00 00  ...w............
0000000001abff08  ff ff ff ff 00 00 00 00 - 00 00 00 00 9b 92 d4 77  ...............w
0000000001abff18  48 b2 05 01 2c 03 00 00 - 38 03 00 00 d0 27 0c 02  H...,...8....'..
0000000001abff28  00 00 00 00 13 01 00 00 - 92 7e 00 00 ea 89 d4 77  .........~.....w
0000000001abff38  00 00 00 00 9b 92 d4 77 - 00 00 00 00 00 00 00 00  .......w........
0000000001abff48  00 60 fd 7f 38 03 00 00 - 6c ff ab 01 a8 96 d4 77  .`..8...l......w
0000000001abff58  01 00 00 00 84 b2 05 01 - ff ff ff ff ff 04 00 00  ................
0000000001abff68  1c ff ab 01 b4 ff ab 01 - a2 56 60 07 01 00 00 00  .........V`.....
0000000001abff78  84 b2 05 01 00 00 00 00 - ff ff ff ff ff 04 00 00  ................
0000000001abff88  1c 56 60 07 88 32 91 7c - 00 00 00 00 c8 f3 05 01  .V`..2.|........

*----> State Dump for Thread Id 0xbd8 <----*

eax=72d230e8 ebx=01dafef8 ecx=0000008b edx=00155c20 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=01dafed0 ebp=01daff6c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv -
ChildEBP RetAddr  Args to Child              
01daff6c 7c809c86 00000002 01daffa4 00000000 ntdll!KiFastSystemCallRet
01daff88 72d2312a 00000002 01daffa4 00000000 kernel32!WaitForMultipleObjects+0x18
01daffb4 7c80b50b 00000000 00000000 00090000 wdmaud!midMessage+0x348
01daffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001dafed0  ab e9 90 7c f2 94 80 7c - 02 00 00 00 f8 fe da 01  ...|...|........
0000000001dafee0  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001dafef0  00 00 00 00 00 00 00 00 - 10 04 00 00 04 04 00 00  ................
0000000001daff00  bc 41 30 82 28 6c 30 aa - 00 00 00 00 27 f4 6f 80  .A0.(l0.....'.o.
0000000001daff10  08 00 00 00 46 02 00 00 - 14 00 00 00 01 00 00 00  ....F...........
0000000001daff20  00 00 00 00 00 00 00 00 - 10 00 00 00 20 40 30 82  ............ @0.
0000000001daff30  54 40 30 82 54 6c 30 aa - 00 f0 fd 7f 00 50 fd 7f  T@0.Tl0......P..
0000000001daff40  20 40 30 82 00 00 00 00 - f8 fe da 01 3c b9 4f 80   @0.........<.O.
0000000001daff50  02 00 00 00 ec fe da 01 - 00 00 00 00 dc ff da 01  ................
0000000001daff60  f3 99 83 7c 90 95 80 7c - 00 00 00 00 88 ff da 01  ...|...|........
0000000001daff70  86 9c 80 7c 02 00 00 00 - a4 ff da 01 00 00 00 00  ...|............
0000000001daff80  ff ff ff ff 00 00 00 00 - b4 ff da 01 2a 31 d2 72  ............*1.r
0000000001daff90  02 00 00 00 a4 ff da 01 - 00 00 00 00 ff ff ff ff  ................
0000000001daffa0  00 00 09 00 10 04 00 00 - 04 04 00 00 f2 fe 6f 80  ..............o.
0000000001daffb0  dc e2 90 7c ec ff da 01 - 0b b5 80 7c 00 00 00 00  ...|.......|....
0000000001daffc0  00 00 00 00 00 00 09 00 - 00 00 00 00 00 50 fd 7f  .............P..
0000000001daffd0  00 06 fc 82 c0 ff da 01 - 08 05 94 82 ff ff ff ff  ................
0000000001daffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
0000000001dafff0  00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00  .....0.r........
0000000001db0000  4d 5a 90 00 03 00 00 00 - 04 00 00 00 ff ff 00 00  MZ..............

*----> State Dump for Thread Id 0xbc8 <----*

eax=00000000 ebx=021bfed4 ecx=00002d80 edx=0002ee00 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=021bfeac ebp=021bff48 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\System32\quartz.dll -
ChildEBP RetAddr  Args to Child              
021bff48 7c809c86 00000003 021bff88 00000000 ntdll!KiFastSystemCallRet
021bff64 7484b7b4 00000003 021bff88 00000000 kernel32!WaitForMultipleObjects+0x18
021bffac 7484c742 021bffec 7c80b50b 010ec4c4 quartz!DllCanUnloadNow+0x2660
021bffb4 7c80b50b 010ec4c4 00157ffc 0015828c quartz!DllCanUnloadNow+0x35ee
021bffec 00000000 7484c735 010ec4c4 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000021bfeac  ab e9 90 7c f2 94 80 7c - 03 00 00 00 d4 fe 1b 02  ...|...|........
00000000021bfebc  01 00 00 00 00 00 00 00 - 08 ff 1b 02 38 67 1a 00  ............8g..
00000000021bfecc  c4 c4 0e 01 00 00 00 00 - 18 06 00 00 20 06 00 00  ............ ...
00000000021bfedc  28 06 00 00 04 ff 1b 02 - 90 e7 f1 73 60 80 f6 01  (..........s`...
00000000021bfeec  00 ee 02 00 00 00 00 00 - 14 00 00 00 01 00 00 00  ................
00000000021bfefc  00 00 00 00 00 00 00 00 - 10 00 00 00 c0 bd f0 ff  ................
00000000021bff0c  ff ff ff ff 55 1e f1 73 - 00 f0 fd 7f 00 40 fd 7f  ....U..s.....@..
00000000021bff1c  20 c3 0e 01 08 ff 1b 02 - d4 fe 1b 02 2f b0 84 74   .........../..t
00000000021bff2c  03 00 00 00 c8 fe 1b 02 - 00 ee 02 00 dc ff 1b 02  ................
00000000021bff3c  f3 99 83 7c 90 95 80 7c - 00 00 00 00 64 ff 1b 02  ...|...|....d...
00000000021bff4c  86 9c 80 7c 03 00 00 00 - 88 ff 1b 02 00 00 00 00  ...|............
00000000021bff5c  64 00 00 00 00 00 00 00 - ac ff 1b 02 b4 b7 84 74  d..............t
00000000021bff6c  03 00 00 00 88 ff 1b 02 - 00 00 00 00 64 00 00 00  ............d...
00000000021bff7c  fc 7f 15 00 8c 82 15 00 - c4 c4 0e 01 18 06 00 00  ................
00000000021bff8c  20 06 00 00 28 06 00 00 - 00 00 00 00 10 6e 44 f3   ...(........nD.
00000000021bff9c  03 00 00 00 18 c4 0e 01 - 64 00 00 00 03 00 00 00  ........d.......
00000000021bffac  b4 ff 1b 02 42 c7 84 74 - ec ff 1b 02 0b b5 80 7c  ....B..t.......|
00000000021bffbc  c4 c4 0e 01 fc 7f 15 00 - 8c 82 15 00 c4 c4 0e 01  ................
00000000021bffcc  00 40 fd 7f 00 26 fc 82 - c0 ff 1b 02 c8 24 18 82  .@...&.......$..
00000000021bffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00  .......|...|....

*----> State Dump for Thread Id 0xcc <----*

eax=00000000 ebx=021ffed4 ecx=000063b0 edx=0002ee00 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=021ffeac ebp=021fff48 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
021fff48 7c809c86 00000003 021fff88 00000000 ntdll!KiFastSystemCallRet
021fff64 7484b7b4 00000003 021fff88 00000000 kernel32!WaitForMultipleObjects+0x18
021fffac 7484c742 021fffec 7c80b50b 010fae24 quartz!DllCanUnloadNow+0x2660
021fffb4 7c80b50b 010fae24 00157ffc 0015828c quartz!DllCanUnloadNow+0x35ee
021fffec 00000000 7484c735 010fae24 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000021ffeac  ab e9 90 7c f2 94 80 7c - 03 00 00 00 d4 fe 1f 02  ...|...|........
00000000021ffebc  01 00 00 00 00 00 00 00 - 08 ff 1f 02 38 67 1a 00  ............8g..
00000000021ffecc  24 ae 0f 01 00 00 00 00 - 04 06 00 00 08 06 00 00  $...............
00000000021ffedc  10 06 00 00 04 ff 1f 02 - 90 e7 f1 73 00 60 fd 01  ...........s.`..
00000000021ffeec  00 ee 02 00 00 00 00 00 - 14 00 00 00 01 00 00 00  ................
00000000021ffefc  00 00 00 00 00 00 00 00 - 10 00 00 00 c0 bd f0 ff  ................
00000000021fff0c  ff ff ff ff 55 1e f1 73 - 00 f0 fd 7f 00 f0 fa 7f  ....U..s........
00000000021fff1c  80 ac 0f 01 08 ff 1f 02 - d4 fe 1f 02 2f b0 84 74  ............/..t
00000000021fff2c  03 00 00 00 c8 fe 1f 02 - 00 ee 02 00 dc ff 1f 02  ................
00000000021fff3c  f3 99 83 7c 90 95 80 7c - 00 00 00 00 64 ff 1f 02  ...|...|....d...
00000000021fff4c  86 9c 80 7c 03 00 00 00 - 88 ff 1f 02 00 00 00 00  ...|............
00000000021fff5c  64 00 00 00 00 00 00 00 - ac ff 1f 02 b4 b7 84 74  d..............t
00000000021fff6c  03 00 00 00 88 ff 1f 02 - 00 00 00 00 64 00 00 00  ............d...
00000000021fff7c  fc 7f 15 00 8c 82 15 00 - 24 ae 0f 01 04 06 00 00  ........$.......
00000000021fff8c  08 06 00 00 10 06 00 00 - 00 00 00 00 00 00 00 00  ................
00000000021fff9c  00 00 00 00 78 ad 0f 01 - 64 00 00 00 03 00 00 00  ....x...d.......
00000000021fffac  b4 ff 1f 02 42 c7 84 74 - ec ff 1f 02 0b b5 80 7c  ....B..t.......|
00000000021fffbc  24 ae 0f 01 fc 7f 15 00 - 8c 82 15 00 24 ae 0f 01  $...........$...
00000000021fffcc  00 f0 fa 7f 00 06 fc 82 - c0 ff 1f 02 c8 24 18 82  .............$..
00000000021fffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00  .......|...|....

*----> State Dump for Thread Id 0xa60 <----*

eax=73f1b94b ebx=00168b08 ecx=ffffffff edx=7c916928 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=023ffd88 ebp=023ffe24 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\DSOUND.dll -
ChildEBP RetAddr  Args to Child              
023ffe24 7c809c86 00000040 023ffe78 00000000 ntdll!KiFastSystemCallRet
023ffe40 73f114a2 00000040 023ffe78 00000000 kernel32!WaitForMultipleObjects+0x18
023ffe58 73f1294a 00000040 ffffffff 00000000 DSOUND+0x14a2
023fff78 73f19fbf ffffffff 0000003f 01b14ff0 DSOUND+0x294a
023fff98 73f1297e 01b126d8 01b14fa4 73f1b993 DSOUND!DirectSoundCreate+0x537c
023fffb4 7c80b50b 01b14fa4 01b126d8 0006bb24 DSOUND+0x297e
023fffec 00000000 73f1b94b 01b14fa4 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000023ffd88  ab e9 90 7c f2 94 80 7c - 40 00 00 00 08 8b 16 00  ...|...|@.......
00000000023ffd98  01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000023ffda8  40 00 00 00 01 00 00 00 - a8 04 00 00 ac 04 00 00  @...............
00000000023ffdb8  b0 04 00 00 00 00 00 00 - 38 00 00 00 23 00 00 00  ........8...#...
00000000023ffdc8  23 00 00 00 d8 26 b1 01 - 14 00 00 00 01 00 00 00  #....&..........
00000000023ffdd8  00 00 00 00 00 00 00 00 - 10 00 00 00 a6 68 91 7c  .............h.|
00000000023ffde8  56 08 81 7c 1b 00 00 00 - 00 f0 fd 7f 00 e0 fa 7f  V..|............
00000000023ffdf8  00 e0 fa 7f 00 00 00 00 - 08 8b 16 00 00 05 00 00  ................
00000000023ffe08  40 00 00 00 a4 fd 3f 02 - d0 19 cf 82 dc ff 3f 02  @.....?.......?.
00000000023ffe18  f3 99 83 7c 90 95 80 7c - 00 00 00 00 40 fe 3f 02  ...|...|....@.?.
00000000023ffe28  86 9c 80 7c 40 00 00 00 - 78 fe 3f 02 00 00 00 00  ...|@...x.?.....
00000000023ffe38  ff ff ff ff 00 00 00 00 - 58 fe 3f 02 a2 14 f1 73  ........X.?....s
00000000023ffe48  40 00 00 00 78 fe 3f 02 - 00 00 00 00 ff ff ff ff  @...x.?.........
00000000023ffe58  78 ff 3f 02 4a 29 f1 73 - 40 00 00 00 ff ff ff ff  x.?.J).s@.......
00000000023ffe68  00 00 00 00 78 fe 3f 02 - a4 4f b1 01 a4 4f b1 01  ....x.?..O...O..
00000000023ffe78  e4 05 00 00 fc 04 00 00 - 08 05 00 00 f8 04 00 00  ................
00000000023ffe88  f0 04 00 00 f4 04 00 00 - ec 04 00 00 e8 04 00 00  ................
00000000023ffe98  e4 04 00 00 e0 04 00 00 - dc 04 00 00 d8 04 00 00  ................
00000000023ffea8  d4 04 00 00 d0 04 00 00 - cc 04 00 00 c8 04 00 00  ................
00000000023ffeb8  c4 04 00 00 c0 04 00 00 - bc 04 00 00 b8 04 00 00  ................

*----> State Dump for Thread Id 0xa78 <----*

eax=013d0000 ebx=0255fdb8 ecx=0255fe30 edx=7c90eb94 esi=00000000 edi=7ffdf000
eip=7c90eb94 esp=0255fd90 ebp=0255fe2c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0255fe2c 7c809c86 00000001 0255fe80 00000000 ntdll!KiFastSystemCallRet
0255fe48 73f114a2 00000001 0255fe80 00000000 kernel32!WaitForMultipleObjects+0x18
0255fe60 73f1294a 00000001 000001f4 00000000 DSOUND+0x14a2
0255ff80 73f12a13 000001f4 00000000 00000000 DSOUND+0x294a
0255ffb4 7c80b50b 01b11efc 00000000 7c910732 DSOUND+0x2a13
0255ffec 00000000 73f1b94b 01b11efc 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000255fd90  ab e9 90 7c f2 94 80 7c - 01 00 00 00 b8 fd 55 02  ...|...|......U.
000000000255fda0  01 00 00 00 00 00 00 00 - ec fd 55 02 00 00 00 00  ..........U.....
000000000255fdb0  01 00 00 00 01 00 00 00 - 50 06 00 00 ab 95 80 7c  ........P......|
000000000255fdc0  f4 fd 55 02 22 95 80 7c - a8 6f b1 01 00 00 00 00  ..U."..|.o......
000000000255fdd0  00 00 00 00 78 05 00 00 - 14 00 00 00 01 00 00 00  ....x...........
000000000255fde0  00 00 00 00 00 00 00 00 - 10 00 00 00 c0 b4 b3 ff  ................
000000000255fdf0  ff ff ff ff 14 00 00 00 - 00 f0 fd 7f 00 d0 fa 7f  ................
000000000255fe00  00 00 00 00 ec fd 55 02 - b8 fd 55 02 40 fe 55 02  ......U...U.@.U.
000000000255fe10  01 00 00 00 ac fd 55 02 - 00 d0 fa 7f dc ff 55 02  ......U.......U.
000000000255fe20  f3 99 83 7c 90 95 80 7c - 00 00 00 00 48 fe 55 02  ...|...|....H.U.
000000000255fe30  86 9c 80 7c 01 00 00 00 - 80 fe 55 02 00 00 00 00  ...|......U.....
000000000255fe40  f4 01 00 00 00 00 00 00 - 60 fe 55 02 a2 14 f1 73  ........`.U....s
000000000255fe50  01 00 00 00 80 fe 55 02 - 00 00 00 00 f4 01 00 00  ......U.........
000000000255fe60  80 ff 55 02 4a 29 f1 73 - 01 00 00 00 f4 01 00 00  ..U.J).s........
000000000255fe70  00 00 00 00 80 fe 55 02 - fc 1e b1 01 fc 1e b1 01  ......U.........
000000000255fe80  50 06 00 00 10 b8 80 7c - f1 e2 90 7c b7 24 80 7c  P......|...|.$.|
000000000255fe90  78 05 00 00 00 00 00 00 - bc fe 55 02 32 26 f1 73  x.........U.2&.s
000000000255fea0  78 05 00 00 e8 1e b1 01 - ab e9 90 7c f2 94 80 7c  x..........|...|
000000000255feb0  00 d0 fa 7f 44 ff 55 02 - ab 95 80 7c f0 fe 55 02  ....D.U....|..U.
000000000255fec0  22 95 80 7c 00 00 00 00 - fc 1e b1 01 fc 1e b1 01  "..|............

*----> State Dump for Thread Id 0xf24 <----*

eax=01c53040 ebx=00000000 ecx=000000f8 edx=01b49f0c esi=0000066c edi=00000000
eip=7c90eb94 esp=02e7fee0 ebp=02e7ff44 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for C:\Program Files\Common Files\Roxio Shared\SharedCOM\RoxioMPEGDemuxer.dll
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\Program Files\Common Files\Roxio Shared\SharedCOM\RoxioMPEGDemuxer.dll -
ChildEBP RetAddr  Args to Child              
02e7ff44 7c802542 0000066c ffffffff 00000000 ntdll!KiFastSystemCallRet
02e7ff58 01b312b9 0000066c ffffffff 00000000 kernel32!WaitForSingleObject+0x12
00000000 00000000 00000000 00000000 00000000 RoxioMPEGDemuxer!DllUnregisterServer+0xe139

*----> Raw Stack Dump <----*
0000000002e7fee0  c0 e9 90 7c db 25 80 7c - 6c 06 00 00 00 00 00 00  ...|.%.|l.......
0000000002e7fef0  00 00 00 00 30 25 80 7c - 6c 06 00 00 00 00 00 00  ....0%.|l.......
0000000002e7ff00  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002e7ff10  10 00 00 00 3c ff e7 02 - 20 18 de 01 00 f0 fd 7f  ....<... .......
0000000002e7ff20  00 c0 fa 7f 00 00 00 00 - bc 00 e2 01 f4 fe e7 02  ................
0000000002e7ff30  94 ff e7 02 9c ff e7 02 - f3 99 83 7c 08 26 80 7c  ...........|.&.|
0000000002e7ff40  00 00 00 00 58 ff e7 02 - 42 25 80 7c 6c 06 00 00  ....X...B%.|l...
0000000002e7ff50  ff ff ff ff 00 00 00 00 - 00 00 00 00 b9 12 b3 01  ................
0000000002e7ff60  6c 06 00 00 ff ff ff ff - 00 00 00 00 30 44 b7 01  l...........0D..
0000000002e7ff70  02 d1 b2 01 6c 06 00 00 - 0c ba 06 00 00 00 00 00  ....l...........
0000000002e7ff80  a8 ff e7 02 30 44 b7 01 - 01 00 00 00 e8 0f c2 01  ....0D..........
0000000002e7ff90  30 44 b7 01 01 00 00 00 - ec ff e7 02 dc ff e7 02  0D..............
0000000002e7ffa0  c8 82 b4 01 ff ff ff ff - ec ff e7 02 52 d5 b2 01  ............R...
0000000002e7ffb0  0c ba 06 00 0c 02 00 00 - 0b b5 80 7c 30 44 b7 01  ...........|0D..
0000000002e7ffc0  0c ba 06 00 0c 02 00 00 - 30 44 b7 01 00 c0 fa 7f  ........0D......
0000000002e7ffd0  00 06 fc 82 c0 ff e7 02 - 70 46 6d 82 ff ff ff ff  ........pFm.....
0000000002e7ffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
0000000002e7fff0  00 00 00 00 40 d5 b2 01 - 30 44 b7 01 00 00 00 00  ....@...0D......
0000000002e80000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002e80010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xa7c <----*

eax=00000000 ebx=00000000 ecx=00000008 edx=02429660 esi=00000678 edi=00000000
eip=7c90eb94 esp=02ebfee0 ebp=02ebff44 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00200246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
02ebff44 7c802542 00000678 ffffffff 00000000 ntdll!KiFastSystemCallRet
02ebff58 01b312b9 00000678 ffffffff 00000000 kernel32!WaitForSingleObject+0x12
00000000 00000000 00000000 00000000 00000000 RoxioMPEGDemuxer!DllUnregisterServer+0xe139

*----> Raw Stack Dump <----*
0000000002ebfee0  c0 e9 90 7c db 25 80 7c - 78 06 00 00 00 00 00 00  ...|.%.|x.......
0000000002ebfef0  00 00 00 00 30 25 80 7c - 78 06 00 00 00 00 00 00  ....0%.|x.......
0000000002ebff00  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002ebff10  10 00 00 00 0c 2c c5 01 - c8 2b c5 01 00 f0 fd 7f  .....,...+......
0000000002ebff20  00 b0 fa 7f 00 00 00 00 - 50 43 b7 01 f4 fe eb 02  ........PC......
0000000002ebff30  54 ff eb 02 9c ff eb 02 - f3 99 83 7c 08 26 80 7c  T..........|.&.|
0000000002ebff40  00 00 00 00 58 ff eb 02 - 42 25 80 7c 78 06 00 00  ....X...B%.|x...
0000000002ebff50  ff ff ff ff 00 00 00 00 - 00 00 00 00 b9 12 b3 01  ................
0000000002ebff60  78 06 00 00 ff ff ff ff - 00 00 00 00 68 45 b7 01  x...........hE..
0000000002ebff70  02 d1 b2 01 78 06 00 00 - 0c ba 06 00 00 00 00 00  ....x...........
0000000002ebff80  a8 ff eb 02 68 45 b7 01 - 01 00 00 00 68 52 b7 01  ....hE......hR..
0000000002ebff90  68 45 b7 01 1e 00 00 00 - ec ff eb 02 dc ff eb 02  hE..............
0000000002ebffa0  c8 82 b4 01 ff ff ff ff - ec ff eb 02 52 d5 b2 01  ............R...
0000000002ebffb0  0c ba 06 00 0c 02 00 00 - 0b b5 80 7c 68 45 b7 01  ...........|hE..
0000000002ebffc0  0c ba 06 00 0c 02 00 00 - 68 45 b7 01 00 b0 fa 7f  ........hE......
0000000002ebffd0  00 06 fc 82 c0 ff eb 02 - c8 75 cd 82 ff ff ff ff  .........u......
0000000002ebffe0  f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00  ...|...|........
0000000002ebfff0  00 00 00 00 40 d5 b2 01 - 68 45 b7 01 00 00 00 00  ....@...hE......
0000000002ec0000  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000002ec0010  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0x894 <----*

eax=00000001 ebx=00000000 ecx=1d232490 edx=1d232898 esi=00000001 edi=00000002
eip=1d1d4cfd esp=02effd68 ebp=02effdd0 iopl=0         nv up ei pl nz ac po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00200216

*** WARNING: Unable to verify checksum for C:\WINDOWS\system32\iviaudio.ax
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\iviaudio.ax -
function: iviaudio
        1d1d4cee cc               int     3
        1d1d4cef cc               int     3
        1d1d4cf0 55               push    ebp
        1d1d4cf1 8bec             mov     ebp,esp
        1d1d4cf3 83ec58           sub     esp,0x58
        1d1d4cf6 53               push    ebx
        1d1d4cf7 56               push    esi
        1d1d4cf8 57               push    edi
        1d1d4cf9 6656             push    si
        1d1d4cfb 6657             push    di
FAULT ->1d1d4cfd 0f0e             femms
        1d1d4cff a1f0ff221d       mov     eax,[iviaudio+0x6fff0 (1d22fff0)]
        1d1d4d04 85c0             test    eax,eax
        1d1d4d06 b92887231d       mov     ecx,0x1d238728
        1d1d4d0b 894df8           mov     [ebp-0x8],ecx
        1d1d4d0e 7418             jz      iviaudio+0x14d28 (1d1d4d28)
        1d1d4d10 b840000000       mov     eax,0x40
        1d1d4d15 c745cc03000000   mov     dword ptr [ebp-0x34],0x3
        1d1d4d1c ba02000000       mov     edx,0x2
        1d1d4d21 be288a231d       mov     esi,0x1d238a28
        1d1d4d26 eb16             jmp     iviaudio+0x14d3e (1d1d4d3e)

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
02effdd0 1d1c4d17 00000002 00000001 00000000 iviaudio+0x14cfd
02effe08 1d1c322a 00000000 00000002 02effea4 iviaudio+0x4d17
1d232498 3bf4c810 00000000 bc013ea0 00000000 iviaudio+0x322a
00000000 00000000 00000000 00000000 00000000 0x3bf4c810

*----> Raw Stack Dump <----*
0000000002effd68  02 00 01 00 02 00 00 00 - 01 00 00 00 00 00 00 00  ................
0000000002effd78  80 fe ef 02 00 00 00 00 - 88 b0 16 01 44 fe ef 02  ............D...
0000000002effd88  5a ba 61 07 80 b0 16 01 - 98 9b 11 00 80 3d 0a 01  Z.a..........=..
0000000002effd98  6b ba 61 07 68 35 14 01 - 94 b0 16 01 04 00 00 00  k.a.h5..........
0000000002effda8  00 00 00 00 00 00 00 01 - 61 75 64 73 00 00 10 00  ........auds....
0000000002effdb8  80 00 00 aa 00 38 9b 71 - 01 00 00 00 00 00 10 00  .....8.q........
0000000002effdc8  00 00 00 00 1f 00 00 00 - 08 fe ef 02 17 4d 1c 1d  .............M..
0000000002effdd8  02 00 00 00 01 00 00 00 - 00 00 00 00 1f 00 00 00  ................
0000000002effde8  02 00 00 00 01 00 00 00 - 00 00 00 00 80 24 00 00  .............$..
0000000002effdf8  00 00 00 00 9c 35 1c 1d - 02 00 00 00 01 00 00 00  .....5..........
0000000002effe08  98 24 23 1d 2a 32 1c 1d - 00 00 00 00 02 00 00 00  .$#.*2..........
0000000002effe18  a4 fe ef 02 00 00 00 00 - 03 00 23 1d 39 11 1c 1d  ..........#.9...
0000000002effe28  5d 10 1c 1d 03 00 00 00 - c0 bd 22 1d ef 02 1d 1d  ].........".....
0000000002effe38  03 00 00 00 c0 bd 22 1d - 00 00 00 00 f0 bf 09 01  ......".........
0000000002effe48  14 c0 09 01 58 fe ef 02 - 00 80 61 07 c4 34 14 01  ....X.....a..4..
0000000002effe58  64 fe ef 02 68 ab 52 07 - 98 37 14 01 00 03 00 00  d...h.R..7......
0000000002effe68  4c 9d 1c 1d 90 37 14 01 - 00 00 00 00 00 03 00 00  L....7..........
0000000002effe78  00 00 00 00 03 00 00 00 - 61 75 64 73 00 00 10 00  ........auds....
0000000002effe88  80 00 00 aa 00 38 9b 71 - 01 00 00 00 00 00 10 00  .....8.q........
0000000002effe98  00 00 00 00 84 c0 09 01 - 00 00 00 00 c8 fe ef 02  ................

*----> State Dump for Thread Id 0xa8c <----*

eax=01b73918 ebx=00000000 ecx=01b73908 edx=00000000 esi=000003ac edi=00000000
eip=7c90eb94 esp=0340fe7c ebp=0340fee0 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0340fee0 7c802542 000003ac ffffffff 00000000 ntdll!KiFastSystemCallRet
0340fef4 01b212b5 000003ac ffffffff 01b7391c kernel32!WaitForSingleObject+0x12
0340ff3c 01b2e8d4 01b73918 0340ff68 00000000 RoxioMPEGDemuxer+0x12b5
dbc00000 00000000 00000000 00000000 00000000 RoxioMPEGDemuxer!DllUnregisterServer+0xb754

*----> Raw Stack Dump <----*
000000000340fe7c  c0 e9 90 7c db 25 80 7c - ac 03 00 00 00 00 00 00  ...|.%.|........
000000000340fe8c  00 00 00 00 c6 8b 02 00 - 80 21 b7 01 00 00 00 00  .........!......
000000000340fe9c  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000340feac  10 00 00 00 00 00 00 00 - 00 00 01 00 00 f0 fd 7f  ................
000000000340febc  00 90 fa 7f 00 00 00 00 - 00 00 00 00 90 fe 40 03  ..............@.
000000000340fecc  2a 26 80 7c 30 ff 40 03 - f3 99 83 7c 08 26 80 7c  *&.|0.@....|.&.|
000000000340fedc  00 00 00 00 f4 fe 40 03 - 42 25 80 7c ac 03 00 00  ......@.B%.|....
000000000340feec  ff ff ff ff 00 00 00 00 - 3c ff 40 03 b5 12 b2 01  ........<.@.....
000000000340fefc  ac 03 00 00 ff ff ff ff - 1c 39 b7 01 08 39 b7 01  .........9...9..
000000000340ff0c  05 00 00 00 d8 fe 40 03 - 1c 39 b7 01 1c 39 b7 01  ......@..9...9..
000000000340ff1c  f3 99 83 7c 00 00 00 03 - 1c 39 b7 01 00 00 00 00  ...|.....9......
000000000340ff2c  00 00 00 00 dc ff 40 03 - 58 78 b4 01 ff ff ff ff  ......@.Xx......
000000000340ff3c  00 00 c0 db d4 e8 b2 01 - 18 39 b7 01 68 ff 40 03  .........9..h.@.
000000000340ff4c  00 00 00 00 00 00 00 00 - 00 00 00 00 02 00 b7 01  ................
000000000340ff5c  ec ff 40 03 80 21 b7 01 - 80 21 b7 01 00 00 00 00  ..@..!...!......
000000000340ff6c  00 00 00 00 f3 99 83 7c - 00 00 00 db 7d 2e 00 00  .......|....}...
000000000340ff7c  00 00 c0 db c6 8b 02 00 - 00 00 00 00 00 00 00 00  ................
000000000340ff8c  00 00 00 db 7d 2e 00 00 - 4d 00 00 00 00 00 01 00  ....}...M.......
000000000340ff9c  00 02 00 00 00 00 00 00 - 62 eb b2 01 00 00 00 00  ........b.......
000000000340ffac  ab 08 b3 01 02 00 b7 01 - 40 06 b7 01 0b b5 80 7c  ........@......|

*----> State Dump for Thread Id 0xa84 <----*

eax=000d12c8 ebx=000493e0 ecx=77609304 edx=00000100 esi=000007d8 edi=00000000
eip=7c90eb94 esp=015efed8 ebp=015eff3c iopl=0         nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000297

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
015eff3c 7c802542 000007d8 000493e0 00000000 ntdll!KiFastSystemCallRet
015eff50 775963f2 000007d8 000493e0 00000000 kernel32!WaitForSingleObject+0x12
015eff6c 77566e3c 000007d8 00007530 7c802550 ole32!CoInstall+0x10b
015eff8c 77518970 015effb4 774fd83b 77606a18 ole32!CoWaitForMultipleHandles+0xfd1b
015eff94 774fd83b 77606a18 0038002d 0018b518 ole32!CoGetObject+0x21a8
015effb4 7c80b50b 0018b518 0038002d 00370034 ole32!IsValidInterface+0x422
015effec 00000000 774fd888 0018b518 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000015efed8  c0 e9 90 7c db 25 80 7c - d8 07 00 00 00 00 00 00  ...|.%.|........
00000000015efee8  0c ff 5e 01 00 00 00 00 - 30 25 80 7c e0 93 04 00  ..^.....0%.|....
00000000015efef8  14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000015eff08  10 00 00 00 00 a2 2f 4d - ff ff ff ff 00 f0 fd 7f  ....../M........
00000000015eff18  00 80 fa 7f 0c ff 5e 01 - 40 ff 5e 01 ec fe 5e 01  ......^.@.^...^.
00000000015eff28  cf d1 4f 77 dc ff 5e 01 - f3 99 83 7c 08 26 80 7c  ..Ow..^....|.&.|
00000000015eff38  00 00 00 00 50 ff 5e 01 - 42 25 80 7c d8 07 00 00  ....P.^.B%.|....
00000000015eff48  e0 93 04 00 00 00 00 00 - 6c ff 5e 01 f2 63 59 77  ........l.^..cYw
00000000015eff58  d8 07 00 00 e0 93 04 00 - 00 00 00 00 18 6a 60 77  .............j`w
00000000015eff68  d8 07 00 00 8c ff 5e 01 - 3c 6e 56 77 d8 07 00 00  ......^.<nVw....
00000000015eff78  30 75 00 00 50 25 80 7c - 18 b5 18 00 c0 07 00 00  0u..P%.|........
00000000015eff88  68 b3 49 02 94 ff 5e 01 - 70 89 51 77 b4 ff 5e 01  h.I...^.p.Qw..^.
00000000015eff98  3b d8 4f 77 18 6a 60 77 - 2d 00 38 00 18 b5 18 00  ;.Ow.j`w-.8.....
00000000015effa8  00 00 4e 77 a3 d8 4f 77 - 34 00 37 00 ec ff 5e 01  ..Nw..Ow4.7...^.
00000000015effb8  0b b5 80 7c 18 b5 18 00 - 2d 00 38 00 34 00 37 00  ...|....-.8.4.7.
00000000015effc8  18 b5 18 00 00 80 fa 7f - 00 26 fc 82 c0 ff 5e 01  .........&....^.
00000000015effd8  28 4e 6a 82 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  (Nj........|...|
00000000015effe8  00 00 00 00 00 00 00 00 - 00 00 00 00 88 d8 4f 77  ..............Ow
00000000015efff8  18 b5 18 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
00000000015f0008  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xcd4 <----*

eax=0019d305 ebx=00000000 ecx=76bf5020 edx=00006c55 esi=0193ff40 edi=77d51042
eip=7c90eb94 esp=0193fef8 ebp=0193ff1c iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\MSWMDM.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0193ff1c 08b737e8 0193ff40 001503a6 00000000 ntdll!KiFastSystemCallRet
0193ffb4 7c80b50b 01060ae0 7c910732 7c9106ab MSWMDM+0x137e8
0193ffec 00000000 08b7367d 01060ae0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000193fef8  be 91 d4 77 82 10 d5 77 - 40 ff 93 01 a6 03 15 00  ...w...w@.......
000000000193ff08  00 00 00 00 00 00 00 00 - 00 00 00 00 42 10 d5 77  ............B..w
000000000193ff18  e0 0a 06 01 b4 ff 93 01 - e8 37 b7 08 40 ff 93 01  .........7..@...
000000000193ff28  a6 03 15 00 00 00 00 00 - 00 00 00 00 32 07 91 7c  ............2..|
000000000193ff38  ab 06 91 7c e0 0a 06 01 - f0 d5 92 82 00 60 fa 7f  ...|.........`..
000000000193ff48  88 ac d4 a9 3c b9 4f 80 - 00 00 00 00 05 00 00 00  ....<.O.........
000000000193ff58  00 00 00 00 00 00 00 00 - d2 35 b7 08 00 00 00 00  .........5......
000000000193ff68  00 00 00 00 00 00 b6 08 - 00 00 00 00 00 00 00 00  ................
000000000193ff78  00 00 00 00 00 00 00 00 - 94 ff 93 01 a6 03 15 00  ................
000000000193ff88  e0 0a 06 01 00 00 00 00 - 90 d7 26 01 57 4d 44 4d  ..........&.WMDM
000000000193ff98  4e 6f 74 69 66 69 63 61 - 74 69 6f 6e 57 69 6e 64  NotificationWind
000000000193ffa8  6f 77 43 6c 61 73 73 00 - 3b 6b 00 00 ec ff 93 01  owClass.;k......
000000000193ffb8  0b b5 80 7c e0 0a 06 01 - 32 07 91 7c ab 06 91 7c  ...|....2..|...|
000000000193ffc8  e0 0a 06 01 00 60 fa 7f - 00 06 fc 82 c0 ff 93 01  .....`..........
000000000193ffd8  c8 24 18 82 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  .$.........|...|
000000000193ffe8  00 00 00 00 00 00 00 00 - 00 00 00 00 7d 36 b7 08  ............}6..
000000000193fff8  e0 0a 06 01 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001940008  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001940018  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001940028  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................

*----> State Dump for Thread Id 0xfa8 <----*

eax=00000000 ebx=001591e8 ecx=01000000 edx=00000000 esi=7fffffff edi=ffffffff
eip=7c90eb94 esp=0198fad0 ebp=0198fb0c iopl=0         nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000297

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\mswsock.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\WS2_32.dll -
*** ERROR: Symbol file could not be found.  Defaulted to export symbols for C:\WINDOWS\system32\WININET.dll -
ChildEBP RetAddr  Args to Child              
0198fb0c 71a55fa7 00000854 0000087c 00000000 ntdll!KiFastSystemCallRet
0198fc00 71ab2e67 00000001 0198fe80 0198fc78 mswsock+0x5fa7
0198fc50 771d712f 00000001 0198fe80 0198fc78 WS2_32!select+0xa7
0198ffac 771d9263 0198ffec 7c80b50b 00187fc0 WININET!GetUrlCacheEntryInfoExW+0x88d
0198ffb4 7c80b50b 00187fc0 71ab1404 0000005d WININET!InternetSetStatusCallback+0x1d7
0198ffec 00000000 771d9256 00187fc0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000198fad0  c0 e9 90 7c 33 40 a5 71 - 54 08 00 00 01 00 00 00  ...|3@.qT.......
000000000198fae0  f8 fa 98 01 b0 fb 98 01 - 80 fe 98 01 a0 fb 98 01  ................
000000000198faf0  42 1e 0f 50 ea 4d c5 01 - ff ff ff ff ff ff ff 7f  B..P.M..........
000000000198fb00  e8 91 15 00 00 00 00 00 - 00 00 00 00 00 fc 98 01  ................
000000000198fb10  a7 5f a5 71 54 08 00 00 - 7c 08 00 00 00 00 00 00  ._.qT...|.......
000000000198fb20  04 00 00 00 7c fd 98 01 - f0 60 75 02 78 fc 98 01  ....|....`u.x...
000000000198fb30  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
000000000198fb40  01 00 00 00 80 0f 05 fd - ff ff ff ff 00 00 00 00  ................
000000000198fb50  00 00 00 00 00 00 00 00 - 40 fb 98 01 e8 91 15 00  ........@.......
000000000198fb60  33 27 00 00 1c fb 98 01 - 04 00 00 00 dc ff 98 01  3'..............
000000000198fb70  34 fc 98 01 b8 44 a5 71 - ff ff ff ff 1c 00 00 00  4....D.q........
000000000198fb80  e8 91 15 00 bc fb 98 01 - 78 fc 98 01 7c fd 98 01  ........x...|...
000000000198fb90  00 00 00 00 a0 fb 98 01 - 00 00 00 00 00 00 00 00  ................
000000000198fba0  80 0f 05 fd ff ff ff ff - 01 00 00 00 00 cb 4a 02  ..............J.
000000000198fbb0  7c 08 00 00 19 00 00 00 - e4 fb 98 01 a3 2e ad 71  |..............q
000000000198fbc0  ec 08 00 00 dc fb 98 01 - 01 00 00 00 f4 fb 98 01  ................
000000000198fbd0  f0 fb 98 01 00 00 00 00 - 00 00 00 00 01 00 00 00  ................
000000000198fbe0  13 fc 98 01 d9 7c 00 00 - 24 fb 98 01 0c 15 aa 71  .....|..$......q
000000000198fbf0  40 fc 98 01 c8 71 a7 71 - 68 2e a5 71 ff ff ff ff  @....q.qh..q....
000000000198fc00  50 fc 98 01 67 2e ab 71 - 01 00 00 00 80 fe 98 01  P...g..q........

*----> State Dump for Thread Id 0x11c <----*

eax=000000c0 ebx=00000000 ecx=7c800000 edx=00000000 esi=0006a0b0 edi=02080000
eip=7c90eb94 esp=01a2ff9c ebp=01a2ffb4 iopl=0         nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000246

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
01a2ffb4 7c80b50b 00000000 02080000 0006a0b0 ntdll!KiFastSystemCallRet
01a2ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001a2ff9c  5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff a2 01  \..|.y.|........
0000000001a2ffac  00 00 00 00 00 00 00 80 - ec ff a2 01 0b b5 80 7c  ...............|
0000000001a2ffbc  00 00 00 00 00 00 08 02 - b0 a0 06 00 00 00 00 00  ................
0000000001a2ffcc  00 40 fa 7f 00 26 fc 82 - c0 ff a2 01 a0 ba 6d 82  .@...&........m.
0000000001a2ffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00  .......|...|....
0000000001a2ffec  00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00  .........y.|....
0000000001a2fffc  00 00 00 00 f9 f9 f9 f9 - f9 f7 fa fe fe fe fe fe  ................
0000000001a3000c  fe fe fe fe fe fe fe fe - fe fe fe fe fe fe fe fe  ................
0000000001a3001c  fe fe fe fe fe fe fe fe - fe fe fe fe fe fe fe fe  ................
0000000001a3002c  fe fe fe fe fe fe fe fe - fe fe fe fe fe fe fe fe  ................
0000000001a3003c  fe fe fe fe fe fe fe fe - fe fe fe fe fe fe fe fe  ................
0000000001a3004c  fe fe fe fe fe fe fe fe - fe fe fe fe fe fe fe fe  ................
0000000001a3005c  fe fe fe fe fe fe fe fe - fe fe fe fe fe fe fe fe  ................
0000000001a3006c  fe fe fe fe fe fe fe fe - fe fe fe fe fe fe fe fe  ................
0000000001a3007c  fe fe fe fe fe fe fe fe - fe fe fe fe fe fe fe fe  ................
0000000001a3008c  fe fe fe fe fe fe fe fe - fe fe fe fe fe fe fe fe  ................
0000000001a3009c  fe fe fe fe fe fe fe fe - f9 f9 f9 f7 fa ee ce a7  ................
0000000001a300ac  a7 a7 a7 a7 a7 a7 a7 a7 - a7 a7 a7 a7 a7 a7 a7 a7  ................
0000000001a300bc  a7 a7 a7 a7 a7 a7 a7 a7 - a7 a7 a7 a7 a7 a7 a7 a7  ................
0000000001a300cc  a7 a7 a7 a7 a7 a7 a7 a7 - a7 a7 a7 a7 a7 a7 a7 a7  ................

*----> State Dump for Thread Id 0xb74 <----*

eax=000c7350 ebx=00000000 ecx=0000ec73 edx=024f8a60 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=0280ff70 ebp=0280ffb4 iopl=0         nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000             efl=00000286

function: ntdll!KiFastSystemCallRet
        7c90eb89 90               nop
        7c90eb8a 90               nop
        ntdll!KiFastSystemCall:
        7c90eb8b 8bd4             mov     edx,esp
        7c90eb8d 0f34             sysenter
        7c90eb8f 90               nop
        7c90eb90 90               nop
        7c90eb91 90               nop
        7c90eb92 90               nop
        7c90eb93 90               nop
        ntdll!KiFastSystemCallRet:
        7c90eb94 c3               ret
        7c90eb95 8da42400000000   lea     esp,[esp]
        7c90eb9c 8d642400         lea     esp,[esp]
        7c90eba0 90               nop
        7c90eba1 90               nop
        7c90eba2 90               nop
        7c90eba3 90               nop
        7c90eba4 90               nop
        ntdll!KiIntSystemCall:
        7c90eba5 8d542408         lea     edx,[esp+0x8]
        7c90eba9 cd2e             int     2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child              
0280ffb4 7c80b50b 00000000 00000000 00000000 ntdll!KiFastSystemCallRet
0280ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000280ff70  1b e3 90 7c 9d 07 91 7c - 84 08 00 00 ac ff 80 02  ...|...|........
0000000002