dan5460
asked on
Blue screen galore, random BSOD need help
Hello experts, I have been fighting this problem now for awhile and been searching this site for informaton. Â I am getting massive BSOD and it seems to be random. Â I could be doing anything at all and would get it. Â I ran memtest for about 15 hours and everything went well. Â I ran all my antispyware programs anti virus program and came clean. Â I have updated all my drivers and updated Microsoft patches. Â This is a fairly new re-install of windows as of January of this year. Â
I tried debugging the minidumps, but I am not sure what I am looking at. Â It seems that I sometimes have a failure on my USB, Nvidia, and I get IRQ not equal to, just about everything. Â I really need help to debug and find a solution to this problem Â
I posted my minidump and a current profile of my system on the following url. Â
http://www.dvalen.com/mini_dumps_files.htm
Any help will be much appreciated. Â
Thanks again
Danny
I tried debugging the minidumps, but I am not sure what I am looking at. Â It seems that I sometimes have a failure on my USB, Nvidia, and I get IRQ not equal to, just about everything. Â I really need help to debug and find a solution to this problem Â
I posted my minidump and a current profile of my system on the following url. Â
http://www.dvalen.com/mini_dumps_files.htm
Any help will be much appreciated. Â
Thanks again
Danny
If it is an Nvidia chipset on the Mboard or video card, it MUST have RAM with true CL=2.5 and no slower. Â If you have RAM that is CL3, it will pass all tests, but its refresh is TOO SLOW for Nvidia chipsets. Â The symptoms you describe are exactly what you get from CL3 RAM chips. Â My bet is that you do indeed have CL3 ram chips and they will have to be replaced. Â The BSODs are always random with this problem. Â CL is the "refresh speed" of the RAM in nanosceonds. Â If too slow, Nvidia chipset freeze, cant get data fast enough.
test your ram with memtest86+ from : Â http://www.memtest.org/Â Â Â Â Â Â Â ( if you did not use this one )
and do a scan disk for errors on your disk drive.
also, check the CPU temperature if it get's up tto high - check it in the bios.
since you did not post your specs, check if your system is not underppowered, calculate what you need here :
http://www.jscustompcs.com/power_supply/
and do a scan disk for errors on your disk drive.
also, check the CPU temperature if it get's up tto high - check it in the bios.
since you did not post your specs, check if your system is not underppowered, calculate what you need here :
http://www.jscustompcs.com/power_supply/
ASKER
Thanks for the info. Â I did post my specs on my website as posted above. Â My cpu temp is at 127F. Â
As for the Nvidia chipset, do you think I should just get a new video card? Â Â If I run the 3Dmark 2005, would it be able to identify if it is indeed the video card or the Ram. Â It is hard to believe that it would be my Ram. Â
So I am assuming that based on the comments above that it is either the Video card or my Ram. Â Is this correct?
Thanks again
Danny
As for the Nvidia chipset, do you think I should just get a new video card? Â Â If I run the 3Dmark 2005, would it be able to identify if it is indeed the video card or the Ram. Â It is hard to believe that it would be my Ram. Â
So I am assuming that based on the comments above that it is either the Video card or my Ram. Â Is this correct?
Thanks again
Danny
>> Â either the Video card or my Ram. Â Is this correct? Â <<Â those are the most probable.
did you check how much power you need ?
 Â
did you check how much power you need ?
 Â
ASKER
Yes, I just check it, and it look like i need about 333 watts. Â Once I get home from work, I will check to see the watt on my PSU. Â The strange thing is that I did not add anything extra, so I am not sure if it the PSU. Â
I am guessing that it will probably be the NVidea card, since I noticed that at one time the fan stopped working and I ended up buying a new fan for it. Â maybe at one point the the card got overheated and now it is faulty. Â I will check with the 3dmark app.
Thanks
Danny
I am guessing that it will probably be the NVidea card, since I noticed that at one time the fan stopped working and I ended up buying a new fan for it. Â maybe at one point the the card got overheated and now it is faulty. Â I will check with the 3dmark app.
Thanks
Danny
you can test your video card by typing dxdiag in the run box, select display tab, and test 2D and 3D
ASKER
Hello,
Here is an update. Â I ran the dxdiag and everything went fine. Â No BSOD. Â I also ran the 3dMark version 2003, which is the only one i currently have and ran every test with no incident. Â Now, I am not sure what is happening. Â
As far as the RAM, Â scrathcyboy mentioned that I might have CL3 instead of CL2.5 Â How do I find out what I have? Â If I do have CL3, would I have not gotten this BSOD when I first installed the RAM more then a year ago? Â
Still not sure what to do.
Thanks
Here is an update. Â I ran the dxdiag and everything went fine. Â No BSOD. Â I also ran the 3dMark version 2003, which is the only one i currently have and ran every test with no incident. Â Now, I am not sure what is happening. Â
As far as the RAM, Â scrathcyboy mentioned that I might have CL3 instead of CL2.5 Â How do I find out what I have? Â If I do have CL3, would I have not gotten this BSOD when I first installed the RAM more then a year ago? Â
Still not sure what to do.
Thanks
>>  How do I find out what I have  << note the product code on the ram, and google for it, or check it at www.kingston.com
ASKER
Hello,
I checked the ram last night and they are all CL2.5. Â I noticed that on my motherboard, it has a chip or something that indicates MSI AGP/8x. Â Should i look into getting a MSI video board instead of Nvidia or ATI? Â
Thanks
Danny
I checked the ram last night and they are all CL2.5. Â I noticed that on my motherboard, it has a chip or something that indicates MSI AGP/8x. Â Should i look into getting a MSI video board instead of Nvidia or ATI? Â
Thanks
Danny
you can identify your hardware with Everest :  http://www.majorgeeks.com/downloads9.html     Â
ASKER
Hello experts,
Ok, I took out my video card and installed an old one that I had about 3 months ago. Â It is an NVidia GeForce FX 5200. Â Today, I opened a project that I have in an application called Proshow that creates DVD out of pictures, anyway, left it running and when I got back, I got the BSOD. Â
I got the minidump and still can't figure it out. Â I ran Dr.Watson and this is the output I got. Â Hope it helps. Â Any suggestions?
Â
Application exception occurred:
    App: C:\WINDOWS\explorer.exe (pid=120044)
    When: 1/14/2006 @ 22:02:19.100
    Exception number: c0000005 (access violation)
*----> System Information <----*
    Computer Name: SKULL
    User Name: Danny V
    Terminal Session Id: 0
    Number of Processors: 1
    Processor Type: x86 Family 6 Model 8 Stepping 1
    Windows Version: 5.1
    Current Build: 2600
    Service Pack: 2
    Current Type: Uniprocessor Free
    Registered Organization:
    Registered Owner: Danny
*----> Task List <----*
  0 System Process
  4 System
 640 smss.exe
 712 csrss.exe
 740 winlogon.exe
 784 services.exe
 804 lsass.exe
 984 svchost.exe
1068 svchost.exe
1212 svchost.exe
1240 StyleXPService.exe
1372 svchost.exe
1488 SDMCP.exe
1496 svchost.exe
1724 spoolsv.exe
1992 avgamsvr.exe
2028 avgupsvc.exe
2044 avgemc.exe
 172 Error 0xD0000022
 188 CTsvcCDA.exe
 220 nvsvc32.exe
 300 ScsiAccess.exe
 688 svchost.exe
 916 WRSSSDK.exe
1356 avgcc.exe
1364 CTSysVol.exe
1368 CTDVDDET.EXE
1396 CTHELPER.EXE
1416 tfswctrl.exe
1484 gcasServ.exe
1532 RUNDLL32.EXE
1564 SpySweeper.exe
1596 Error 0xD0000022
1616 wdfmgr.exe
1784 Error 0xD0000022
1856 ctfmon.exe
2068 MsPMSPSv.exe
2308 MemTurbo.exe
2348 YahooWidgetEngine.exe
2520 YahooWidgetEngine.exe
2660 gcasDtServ.exe
3088 alg.exe
3732 YahooWidgetEngine.exe
3876 YahooWidgetEngine.exe
3932 YahooWidgetEngine.exe
4052 YahooWidgetEngine.exe
1160 YahooWidgetEngine.exe
1592 YahooWidgetEngine.exe
2120 YahooWidgetEngine.exe
2476 YahooWidgetEngine.exe
1204 svchost.exe
3484 DOpus.exe
67336 MontageProSH.exe
67340 Thumbs.exe
70764 iexplore.exe
117644 launcher.exe
120044 explorer.exe
119036 hpgs2wnf.exe
119460 NOTEPAD.EXE
118820 setup2.0.exe
118272 INS4F.tmp
120456 drwtsn32.exe
*----> Module List <----*
(0000000001000000 - 00000000010ff000: C:\WINDOWS\explorer.exe
(0000000001630000 - 00000000018f6000: C:\WINDOWS\system32\msi.dl l
(0000000001cc0000 - 0000000001cd0000: C:\WINDOWS\system32\ctagen t.dll
(00000000021b0000 - 00000000022b6000: F:\Apps\TrueLaunchBar\tlb. dll
(0000000010000000 - 0000000010016000: C:\PROGRA~1\COMMON~1\stard ock\MCPCor e.dll
(0000000010040000 - 00000000100b5000: F:\Apps\Directory Opus\dopuslib.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2r es.dll
(000000004d4f0000 - 000000004d548000: C:\WINDOWS\system32\WINHTT P.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxThem e.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI 32.dll
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\System32\themeu i.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEn g.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl 32.dll
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui .dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenr al.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HEL P.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32 .dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\System32\WSOCK3 2.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dl l
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB .dll
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanm an.dll
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP .dll
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1 .dll
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0 .dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxpr xy.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF. dll
(0000000074980000 - 0000000074ab0000: C:\WINDOWS\system32\msxml3 .dll
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\System32\POWRPR OF.dll
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\System32\BatMet er.dll
(0000000074b30000 - 0000000074b76000: C:\WINDOWS\System32\webche ck.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTU I.dll
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov .dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davcln t.dll
(0000000075f80000 - 000000007607d000: C:\WINDOWS\system32\BROWSE UI.dll
(0000000076280000 - 00000000762a1000: C:\WINDOWS\System32\stobje ct.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA .dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG3 2.dll
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg 32.dll
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHE LL.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL .dll
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKIN FO.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshru i.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USEREN V.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DL L
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM. dll
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui .dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRU ST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEH LP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpa pi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutil s.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI 32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP3 2.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCAT Q.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes .dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT 32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININE T.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Micr osoft.Wind ows.Common -Controls_ 6595b64144 ccf1df_6.0 .2600.2180 _x-ww_a84f 1ff9\comct l32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32. dll
(0000000077760000 - 00000000778ce000: C:\WINDOWS\system32\SHDOCV W.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPA PI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui. dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT3 2.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1 .dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHel p.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM3 2.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSIO N.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt .dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32 .dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI 32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4 .dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32. dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAP I.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\System32\Secur3 2.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel 32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll. dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL3 2.dll
*----> State Dump for Thread Id 0x1d4d4 <----*
eax=00000009 ebx=00000003 ecx=0000012e edx=0000029a esi=00133120 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0 Â Â Â Â nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000202
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\ntdll. dll -
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\SHELL3 2.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\explorer.exe
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\kernel 32.dll -
ChildEBP RetAddr  Args to Child       Â
0007ff08 7ca0be38 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 00133120 7ffde000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 0002066e explorer+0x16e95
0007ffc0 7c816d4f 001587e8 0006e890 7ffde000 explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341 kernel32!RegisterWaitForIn putIdle+0x 49
*----> Raw Stack Dump <----*
000000000007fef0 Â 18 94 d4 77 a2 3b a2 7c - ac 92 80 7c 20 31 13 00 Â ...w.;.|...| 1..
000000000007ff00  20 31 13 00 14 ff 07 00 - 14 ff 07 00 38 be a0 7c  1..........8..|
000000000007ff10 Â 00 00 00 00 5c ff 07 00 - 95 6e 01 01 20 31 13 00 Â ....\....n.. 1..
000000000007ff20 Â 00 e0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00 Â ............$...
000000000007ff30  50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c ed aa 80 7c  P.......'..|...|
000000000007ff40 Â ff ff ff ff 0c 00 00 00 - 00 00 00 00 e5 97 32 05 Â ..............2.
000000000007ff50 Â a8 00 00 00 01 00 00 00 - 20 31 13 00 c0 ff 07 00 Â ........ 1......
000000000007ff60 Â b6 e2 01 01 00 00 00 00 - 00 00 00 00 6e 06 02 00 Â ............n...
000000000007ff70 Â 05 00 00 00 e8 87 15 00 - 90 e8 06 00 44 00 00 00 Â ............D...
000000000007ff80 Â c0 06 02 00 a0 06 02 00 - 70 06 02 00 00 00 00 00 Â ........p.......
000000000007ff90 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 2e 00 00 00 Â ................
000000000007ffa0 Â 00 00 00 00 3a ef 06 00 - 01 00 00 00 05 00 00 00 Â ....:...........
000000000007ffb0 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
000000000007ffc0 Â f0 ff 07 00 4f 6d 81 7c - e8 87 15 00 90 e8 06 00 Â ....Om.|........
000000000007ffd0 Â 00 e0 fd 7f 38 a9 54 80 - c8 ff 07 00 18 b7 af 85 Â ....8.T.........
000000000007ffe0 Â ff ff ff ff f3 99 83 7c - 58 6d 81 7c 00 00 00 00 Â .......|Xm.|....
000000000007fff0 Â 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00 Â ........N.......
0000000000080000 Â 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Â Actx ........$..
0000000000080010 Â c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00 Â ........ .......
0000000000080020 Â 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00 Â ............4...
*----> State Dump for Thread Id 0x1d508 <----*
eax=01916d9c ebx=00000000 ecx=01916d9c edx=000a5b7c esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=00e3fe1c ebp=00e3ff80 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4 .dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
00e3ff80 77e76c22 00e3ffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
00e3ff88 77e76a3b 000d0dc0 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5 ea
00e3ffa8 77e76c0a 000d0c78 00e3ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4 03
00e3ffb4 7c80b50b 000e0978 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5 d2
00e3ffec 00000000 77e76bf0 000e0978 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000000e3fe1c  99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff e3 00  ...|.g.w....p...
0000000000e3fe2c  00 00 00 00 a0 2f 0e 00 - 4c ff e3 00 04 00 00 00  ...../..L.......
0000000000e3fe3c  f8 fd 3f 01 00 00 00 00 - a8 da 38 e2 80 e5 ab 89  ..?.......8.....
0000000000e3fe4c  48 2d da b5 00 00 00 00 - f8 fd 3f 01 00 00 00 00  H-........?.....
0000000000e3fe5c  98 e5 ab 89 80 e5 ab 89 - 48 2d da b5 fd bc 56 80  ........H-....V.
0000000000e3fe6c  64 2d da b5 cc fd 3f 01 - 34 bc 56 80 00 00 00 00  d-....?.4.V.....
0000000000e3fe7c  00 00 00 00 00 00 00 00 - a8 da 38 e2 98 cb 01 00  ..........8.....
0000000000e3fe8c  01 6a 56 80 00 00 00 00 - 20 2c da b5 00 00 00 00  .jV..... ,......
0000000000e3fe9c  00 00 00 00 d8 fd 3f 01 - 9c cb 01 00 00 00 00 00  ......?.........
0000000000e3feac  c0 da 38 e2 38 e7 18 e1 - 29 c9 33 e4 b8 2b da b5  ..8.8...).3..+..
0000000000e3febc  07 00 00 00 b8 03 d0 89 - 18 2c da b5 18 00 00 00  .........,......
0000000000e3fecc  d0 a5 bd e2 01 fd 3f 01 - 18 00 00 00 d0 a5 bd e2  ......?.........
0000000000e3fedc  01 fd 3f 01 8d 3c 56 80 - f8 2c da b5 00 00 00 00  ..?..<V..,......
0000000000e3feec  d8 fd 3f 01 f8 2c da b5 - 18 2c da b5 f8 2c da b5  ..?..,...,...,..
0000000000e3fefc  18 2c da b5 d8 fd 3f 01 - d0 a5 bd e2 b8 a5 bd e2  .,....?.........
0000000000e3ff0c  d8 a2 ad 85 14 2c da b5 - 54 8a ad 85 24 2c da b5  .....,..T...$,..
0000000000e3ff1c  b2 c2 4d 80 ba c2 4d 80 - 24 8a ad 85 b8 88 ad 85  ..M...M.$.......
0000000000e3ff2c  ec 88 ad 85 80 ff e3 00 - 99 66 e7 77 4c ff e3 00  .........f.wL...
0000000000e3ff3c  a9 66 e7 77 ed 10 90 7c - 00 f7 0d 00 78 09 0e 00  .f.w...|....x...
0000000000e3ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......
*----> State Dump for Thread Id 0x1d50c <----*
eax=774fe429 ebx=00007530 ecx=7ffde000 edx=00000000 esi=000001c0 edi=00000000
eip=7c90eb94 esp=00e8ff28 ebp=00e8ff8c iopl=0 Â Â Â Â nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000297
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\ole32. dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
00e8ff8c 774fe407 000001c0 00007530 00000000 ntdll!KiFastSystemCallRet
00e8ffb4 7c80b50b 000e30d0 7c910945 7c91094e ole32!StringFromGUID2+0x60 5
00e8ffec 00000000 774fe429 000e30d0 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000000e8ff28 Â c0 e9 90 7c db 25 80 7c - c0 01 00 00 00 00 00 00 Â ...|.%.|........
0000000000e8ff38 Â 5c ff e8 00 50 25 80 7c - d0 30 0e 00 30 75 00 00 Â \...P%.|.0..0u..
0000000000e8ff48 Â 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e8ff58  10 00 00 00 00 5d 1e ee - ff ff ff ff 00 e0 fd 7f  .....]..........
0000000000e8ff68 Â 00 b0 fd 7f 5c ff e8 00 - 58 24 80 7c 3c ff e8 00 Â ....\...X$.|<...
0000000000e8ff78  0f 24 80 7c dc ff e8 00 - f3 99 83 7c 08 26 80 7c  .$.|.......|.&.|
0000000000e8ff88 Â 00 00 00 00 b4 ff e8 00 - 07 e4 4f 77 c0 01 00 00 Â ..........Ow....
0000000000e8ff98 Â 30 75 00 00 00 00 00 00 - 45 09 91 7c d0 30 0e 00 Â 0u......E..|.0..
0000000000e8ffa8 Â 00 00 4e 77 44 e4 4f 77 - 4e 09 91 7c ec ff e8 00 Â ..NwD.OwN..|....
0000000000e8ffb8  0b b5 80 7c d0 30 0e 00 - 45 09 91 7c 4e 09 91 7c  ...|.0..E..|N..|
0000000000e8ffc8 Â d0 30 0e 00 00 b0 fd 7f - 00 26 eb 89 c0 ff e8 00 Â .0.......&......
0000000000e8ffd8  10 55 0d 88 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  .U.........|...|
0000000000e8ffe8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 29 e4 4f 77 Â ............).Ow
0000000000e8fff8 Â d0 30 0e 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â .0..............
0000000000e90008 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e90018 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e90028 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e90038 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e90048 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e90058 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
*----> State Dump for Thread Id 0x1d510 <----*
eax=022ddfa8 ebx=0000001c ecx=0000c055 edx=7c90eb94 esi=022ddfa8 edi=000905dc
eip=021f6eb2 esp=00ecfd60 ebp=0001caa8 iopl=0 Â Â Â Â nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000202
*** WARNING: Unable to verify checksum for F:\Apps\TrueLaunchBar\tlb. dll
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for F:\Apps\TrueLaunchBar\tlb. dll -
function: tlb
    021f6e97 6c        insb
    021f6e98 2428       and   al,0x28
    021f6e9a 8b5c2420     mov   ebx,[esp+0x20]
    021f6e9e 7419       jz    tlb+0x46eb9 (021f6eb9)
    021f6ea0 68a0832502    push   0x22583a0
    021f6ea5 57        push   edi
    021f6ea6 ff15f4262702   call   dword ptr [tlb+0xc26f4 (022726f4)]
    021f6eac 8bf0       mov   esi,eax
    021f6eae 85f6       test   esi,esi
    021f6eb0 7407       jz    tlb+0x46eb9 (021f6eb9)
FAULT ->021f6eb2 397e10      cmp   [esi+0x10],edi   ds:0023:022ddfb8=????????
    021f6eb5 7407       jz    tlb+0x46ebe (021f6ebe)
    021f6eb7 33f6       xor   esi,esi
    021f6eb9 83fb01      cmp   ebx,0x1
    021f6ebc 754a       jnz   tlb+0x46f08 (021f6f08)
    021f6ebe 81fb13010000   cmp   ebx,0x113
    021f6ec4 0f87b3000000   jnbe   tlb+0x46f7d (021f6f7d)
    021f6eca 0f8495000000   je    tlb+0x46f65 (021f6f65)
    021f6ed0 8d43ff      lea   eax,[ebx-0x1]
    021f6ed3 83f820      cmp   eax,0x20
    021f6ed6 7730       ja    tlb+0x46f08 (021f6f08)
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
0001caa8 00000000 00000000 00000000 00000000 tlb+0x46eb2
*----> Raw Stack Dump <----*
0000000000ecfd60 Â dc fd ec 00 80 6e 1f 02 - a0 fd ec 00 00 00 00 00 Â .....n..........
0000000000ecfd70 Â 83 d1 00 00 a0 fd ec 00 - 34 87 d4 77 dc 05 09 00 Â ........4..w....
0000000000ecfd80 Â 1c 00 00 00 00 00 00 00 - a8 ca 01 00 80 6e 1f 02 Â .............n..
0000000000ecfd90 Â cd ab ba dc 00 00 00 00 - dc fd ec 00 80 6e 1f 02 Â .............n..
0000000000ecfda0 Â 08 fe ec 00 16 88 d4 77 - 80 6e 1f 02 dc 05 09 00 Â .......w.n......
0000000000ecfdb0 Â 1c 00 00 00 00 00 00 00 - a8 ca 01 00 28 2e 0f 00 Â ............(...
0000000000ecfdc0 Â dc 05 09 00 02 01 00 00 - 14 00 00 00 01 00 00 00 Â ................
0000000000ecfdd0 Â 00 00 00 00 28 2e 0f 00 - 00 00 00 00 00 00 00 00 Â ....(...........
0000000000ecfde0 Â ff ff ff ff 01 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000ecfdf0 Â bc fd ec 00 84 f9 ec 00 - 4c fe ec 00 67 04 d7 77 Â ........L...g..w
0000000000ecfe00 Â 30 88 d4 77 00 00 00 00 - 5c fe ec 00 c0 b4 d4 77 Â 0..w....\......w
0000000000ecfe10 Â 28 2e 0f 00 80 6e 1f 02 - dc 05 09 00 1c 00 00 00 Â (....n..........
0000000000ecfe20 Â 00 00 00 00 a8 ca 01 00 - cc ee 62 00 01 00 00 00 Â ..........b.....
0000000000ecfe30 Â 00 00 00 00 28 ff ec 00 - 02 01 00 00 d9 8b d4 77 Â ....(..........w
0000000000ecfe40 Â 00 00 00 00 30 fe ec 00 - 84 f9 ec 00 dc ff ec 00 Â ....0...........
0000000000ecfe50 Â 67 04 d7 77 d0 b4 d4 77 - ff ff ff ff 84 fe ec 00 Â g..w...w........
0000000000ecfe60 Â 0c b5 d4 77 b8 ee 62 00 - 1c 00 00 00 00 00 00 00 Â ...w..b.........
0000000000ecfe70 Â a8 ca 01 00 80 6e 1f 02 - 00 00 00 00 00 00 00 00 Â .....n..........
0000000000ecfe80 Â 00 00 00 00 d4 fe ec 00 - e3 ea 90 7c 94 fe ec 00 Â ...........|....
0000000000ecfe90 Â 18 00 00 00 b8 ee 62 00 - 1c 00 00 00 00 00 00 00 Â ......b.........
*----> State Dump for Thread Id 0x1d514 <----*
eax=7c92798d ebx=00000000 ecx=77dd6a51 edx=77dd6a18 esi=ffffffff edi=7c90fb78
eip=7c90eb94 esp=00f0ff9c ebp=00f0ffb4 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
00f0ffb4 7c80b50b 00000000 7c90fb78 ffffffff ntdll!KiFastSystemCallRet
00f0ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000000f0ff9c  5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff f0 00  \..|.y.|........
0000000000f0ffac  00 00 00 00 00 00 00 80 - ec ff f0 00 0b b5 80 7c  ...............|
0000000000f0ffbc  00 00 00 00 78 fb 90 7c - ff ff ff ff 00 00 00 00  ....x..|........
0000000000f0ffcc  00 90 fd 7f 00 26 eb 89 - c0 ff f0 00 78 fb e4 87  .....&......x...
0000000000f0ffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00  .......|...|....
0000000000f0ffec  00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00  .........y.|....
0000000000f0fffc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1000c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1001c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1002c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1003c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1004c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1005c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1006c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1007c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1008c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1009c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f100ac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f100bc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f100cc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
*----> State Dump for Thread Id 0x1d518 <----*
eax=000d9b48 ebx=00000000 ecx=64710003 edx=64700002 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=00f4ff70 ebp=00f4ffb4 iopl=0 Â Â Â Â nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000286
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
00f4ffb4 7c80b50b 00000000 00ecfce4 00ecfce8 ntdll!KiFastSystemCallRet
00f4ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000000f4ff70 Â 1b e3 90 7c 9d 07 91 7c - ec 01 00 00 ac ff f4 00 Â ...|...|........
0000000000f4ff80 Â b0 ff f4 00 98 ff f4 00 - a0 ff f4 00 e4 fc ec 00 Â ................
0000000000f4ff90 Â e8 fc ec 00 00 00 00 00 - 00 00 00 00 b0 c0 92 01 Â ................
0000000000f4ffa0  00 7c 28 e8 ff ff ff ff - 35 5c 70 80 69 75 92 7c  .|(.....5\p.iu.|
0000000000f4ffb0 Â 70 39 13 00 ec ff f4 00 - 0b b5 80 7c 00 00 00 00 Â p9.........|....
0000000000f4ffc0  e4 fc ec 00 e8 fc ec 00 - 00 00 00 00 00 80 fd 7f  ................
0000000000f4ffd0  00 26 eb 89 c0 ff f4 00 - 78 fb e4 87 ff ff ff ff  .&......x.......
0000000000f4ffe0 Â f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 Â ...|...|........
0000000000f4fff0 Â 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 Â ....`..|........
0000000000f50000 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50010 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50020 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50030 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50040 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50050 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50060 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50070 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50080 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50090 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f500a0 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
*----> State Dump for Thread Id 0x1d51c <----*
eax=000000c0 ebx=00000000 ecx=00ecfb00 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=00f8fcec ebp=00f8ffb4 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
00f8ffb4 7c80b50b 00000000 00000020 00ecfce4 ntdll!KiFastSystemCallRet
00f8ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000000f8fcec  ab e9 90 7c d5 a0 92 7c - 03 00 00 00 30 fd f8 00  ...|...|....0...
0000000000f8fcfc  01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00  ............ ...
0000000000f8fd0c  e4 fc ec 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c  ...........|...|
0000000000f8fd1c  f4 01 00 00 1c d5 01 00 - 03 00 00 00 03 00 00 00  ................
0000000000f8fd2c  02 00 00 00 f0 01 00 00 - d8 01 00 00 b0 04 00 00  ................
0000000000f8fd3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdcc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fddc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdfc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fe0c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fe1c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
*----> State Dump for Thread Id 0x1d524 <----*
eax=00fe0010 ebx=001077d0 ecx=00001000 edx=7c90eb94 esi=00000000 edi=7ffde000
eip=7c90eb94 esp=015efd30 ebp=015efdcc iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\USER32 .dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
015efdcc 77d495f9 00000009 015efdf4 00000000 ntdll!KiFastSystemCallRet
015efe28 7c9f4e37 00000008 015efe50 ffffffff USER32!GetLastInputInfo+0x 105
015eff4c 7ca0a334 77f74292 00000000 7c809988 SHELL32!Ordinal646+0x21e2
015effb4 7c80b50b 00000000 7c809988 00090000 SHELL32!Ordinal753+0x133
015effec 00000000 77f74223 00ecf4d4 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
00000000015efd30 Â ab e9 90 7c f2 94 80 7c - 09 00 00 00 d0 77 10 00 Â ...|...|.....w..
00000000015efd40 Â 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
00000000015efd50 Â 09 00 00 00 02 00 00 00 - 18 bd 5a 00 14 00 00 00 Â ..........Z.....
00000000015efd60 Â 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 Â ................
00000000015efd70 Â 00 00 00 00 30 00 00 00 - 14 00 00 00 01 00 00 00 Â ....0...........
00000000015efd80 Â 60 d1 0e 00 00 00 00 00 - 00 00 00 00 ec fd 5e 01 Â `.............^.
00000000015efd90  67 04 d7 77 30 88 d4 77 - 00 e0 fd 7f 00 60 fd 7f  g..w0..w.....`..
00000000015efda0 Â 00 60 fd 7f 00 00 00 00 - d0 77 10 00 e2 00 06 00 Â .`.......w......
00000000015efdb0 Â 09 00 00 00 4c fd 5e 01 - 00 00 00 00 dc ff 5e 01 Â ....L.^.......^.
00000000015efdc0 Â f3 99 83 7c 90 95 80 7c - 00 00 00 00 28 fe 5e 01 Â ...|...|....(.^.
00000000015efdd0 Â f9 95 d4 77 09 00 00 00 - f4 fd 5e 01 00 00 00 00 Â ...w......^.....
00000000015efde0 Â ff ff ff ff 01 00 00 00 - 80 b5 11 00 08 00 00 00 Â ................
00000000015efdf0 Â 00 00 00 00 bc 04 00 00 - 5c 04 00 00 0c 03 00 00 Â ........\.......
00000000015efe00 Â e0 02 00 00 e4 02 00 00 - 38 02 00 00 40 02 00 00 Â ........8...@...
00000000015efe10 Â 44 02 00 00 14 02 00 00 - 00 00 00 00 01 00 00 00 Â D...............
00000000015efe20  00 60 fd 7f 14 02 00 00 - 4c ff 5e 01 37 4e 9f 7c  .`......L.^.7N.|
00000000015efe30 Â 08 00 00 00 50 fe 5e 01 - ff ff ff ff ff 04 00 00 Â ....P.^.........
00000000015efe40 Â f4 fd 5e 01 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ..^.............
00000000015efe50 Â bc 04 00 00 5c 04 00 00 - 0c 03 00 00 e0 02 00 00 Â ....\...........
00000000015efe60 Â e4 02 00 00 38 02 00 00 - 40 02 00 00 44 02 00 00 Â ....8...@...D...
*----> State Dump for Thread Id 0x1d580 <----*
eax=7751a2bf ebx=00000000 ecx=00000000 edx=00000008 esi=01b8ff98 edi=00000000
eip=7c90eb94 esp=01b8ff58 ebp=01b8ff74 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\NETSHE LL.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
01b8ff74 764434cb 01b8ff98 00000000 00000000 ntdll!KiFastSystemCallRet
01b8ffb4 7c80b50b 76476328 00000000 7c900000 NETSHELL!NetSetupSetProgre ssCallback +0x19160
01b8ffec 00000000 7644348c 76476328 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000001b8ff58 Â be 91 d4 77 f1 91 d4 77 - 98 ff b8 01 00 00 00 00 Â ...w...w........
0000000001b8ff68 Â 00 00 00 00 00 00 00 00 - c6 91 d4 77 b4 ff b8 01 Â ...........w....
0000000001b8ff78 Â cb 34 44 76 98 ff b8 01 - 00 00 00 00 00 00 00 00 Â .4Dv............
0000000001b8ff88 Â 00 00 00 00 00 00 90 7c - 00 00 00 00 28 63 47 76 Â .......|....(cGv
0000000001b8ff98 Â 00 00 00 00 00 00 00 00 - 81 a8 4f 80 9c 4c 50 b8 Â ..........O..LP.
0000000001b8ffa8 Â 35 5c 70 80 00 00 00 00 - dc e2 90 7c ec ff b8 01 Â 5\p........|....
0000000001b8ffb8  0b b5 80 7c 28 63 47 76 - 00 00 00 00 00 00 90 7c  ...|(cGv.......|
0000000001b8ffc8 Â 28 63 47 76 00 d0 fa 7f - 00 26 eb 89 c0 ff b8 01 Â (cGv.....&......
0000000001b8ffd8  a8 fe d5 89 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  ...........|...|
0000000001b8ffe8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 8c 34 44 76 Â .............4Dv
0000000001b8fff8 Â 28 63 47 76 00 00 00 00 - c8 00 00 00 6b 01 00 00 Â (cGv........k...
0000000001b90008 Â ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00 Â ................
0000000001b90018 Â 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 Â ..... ....... ..
0000000001b90028 Â e8 01 00 00 ff ef fd 7f - 0c 00 08 06 00 00 00 00 Â ................
0000000001b90038 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 98 05 b9 01 Â ................
0000000001b90048 Â 0f 00 00 00 f8 ff ff ff - 50 00 b9 01 50 00 b9 01 Â ........P...P...
0000000001b90058 Â 40 06 b9 01 00 00 00 00 - 00 00 00 00 00 00 00 00 Â @...............
0000000001b90068 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001b90078 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001b90088 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
*----> State Dump for Thread Id 0x1d590 <----*
eax=77e76bf0 ebx=00000000 ecx=0000000c edx=003c3750 esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=01cafe1c ebp=01caff80 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
01caff80 77e76c22 01caffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
01caff88 77e76a3b 000d0dc0 00000000 003c0178 RPCRT4!I_RpcBCacheFree+0x5 ea
01caffa8 77e76c0a 000d0c78 01caffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4 03
01caffb4 7c80b50b 0190e658 00000000 003c0178 RPCRT4!I_RpcBCacheFree+0x5 d2
01caffec 00000000 77e76bf0 0190e658 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000001cafe1c  99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff ca 01  ...|.g.w....p...
0000000001cafe2c  00 00 00 00 10 5a 90 01 - 4c ff ca 01 00 00 00 00  .....Z..L.......
0000000001cafe3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe4c  00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe6c  ea 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe8c  00 00 00 00 00 00 00 00 - d4 3b eb b5 40 19 56 80  .........;..@.V.
0000000001cafe9c  e1 a9 54 80 00 00 00 00 - f8 e9 c7 89 80 d8 c7 89  ..T.............
0000000001cafeac  00 00 00 00 00 00 00 00 - 00 00 00 00 e4 93 49 f7  ..............I.
0000000001cafebc  18 1e e3 89 02 00 00 00 - a8 1d e3 89 a8 1d e3 89  ................
0000000001cafecc  c0 3b eb b5 1f 41 4e 80 - c8 e9 bb 89 98 ed 3e 88  .;...AN.......>.
0000000001cafedc  06 02 00 00 9d b7 4d 80 - 02 00 00 00 52 41 4e 80  ......M.....RAN.
0000000001cafeec  98 ed 3e 88 00 00 00 00 - f4 3b eb b5 5b 89 4a f7  ..>......;..[.J.
0000000001cafefc  dc 93 49 f7 a0 ed 3e 88 - f8 e9 c7 89 80 d8 c7 89  ..I...>.........
0000000001caff0c  78 5a 97 b9 7a 89 4a f7 - bc 31 b7 85 24 3c eb b5  xZ..z.J..1..$<..
0000000001caff1c  b2 c2 4d 80 ba c2 4d 80 - 8c 31 b7 85 20 30 b7 85  ..M...M..1.. 0..
0000000001caff2c  54 30 b7 85 80 ff ca 01 - 99 66 e7 77 4c ff ca 01  T0.......f.wL...
0000000001caff3c  a9 66 e7 77 ed 10 90 7c - f0 23 90 01 58 e6 90 01  .f.w...|.#..X...
0000000001caff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......
*----> State Dump for Thread Id 0x1d634 <----*
eax=77e76bf0 ebx=00000000 ecx=00090178 edx=00090000 esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=01e3fe1c ebp=01e3ff80 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
01e3ff80 77e76c22 01e3ffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
01e3ff88 77e76a3b 000d0dc0 01b931e8 00000018 RPCRT4!I_RpcBCacheFree+0x5 ea
01e3ffa8 77e76c0a 000d0c78 01e3ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4 03
01e3ffb4 7c80b50b 001313c8 01b931e8 00000018 RPCRT4!I_RpcBCacheFree+0x5 d2
01e3ffec 00000000 77e76bf0 001313c8 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000001e3fe1c  99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff e3 01  ...|.g.w....p...
0000000001e3fe2c  00 00 00 00 c8 00 92 01 - 54 ff e3 01 00 00 00 00  ........T.......
0000000001e3fe3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3feac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3febc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fecc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fedc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3feec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fefc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 01  ................
0000000001e3ff0c  00 00 00 01 00 00 00 01 - bc 51 b0 85 24 dc ff b7  .........Q..$...
0000000001e3ff1c  b2 c2 4d 80 ba c2 4d 80 - 8c 51 b0 85 20 50 b0 85  ..M...M..Q.. P..
0000000001e3ff2c  54 50 b0 85 80 ff e3 01 - 99 66 e7 77 4c ff e3 01  TP.......f.wL...
0000000001e3ff3c  a9 66 e7 77 ed 10 90 7c - f0 04 13 00 c8 13 13 00  .f.w...|........
0000000001e3ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......
*----> State Dump for Thread Id 0x1d684 <----*
eax=00000004 ebx=000003b8 ecx=002826a0 edx=7f6f0801 esi=0000004a edi=01f6f45c
eip=7c90eb94 esp=01f6f3b8 ebp=01f6f3f4 iopl=0 Â Â Â Â nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000202
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\System32\stobje ct.dll -
ChildEBP RetAddr  Args to Child       Â
01f6f3f4 77d4e4ab 00020078 0000004a 00120520 ntdll!KiFastSystemCallRet
01f6f41c 7ca21c37 00020078 0000004a 00120520 USER32!SendMessageTimeoutW +0x21
01f6f828 7645476d 00000001 01f6f83c 01f6fc84 SHELL32!Shell_NotifyIconW+ 0x12d
01f6fbf8 76454c4a 00000000 000000be 01f6fc1c NETSHELL!NetSetupSetProgre ssCallback +0x2a402
01f6fc08 7640f555 00120520 00000000 000000be NETSHELL!NetSetupSetProgre ssCallback +0x2a8df
01f6fc1c 77d48734 00120520 00000405 00000000 NETSHELL!NormalizeExtended Status+0x3 bb6
01f6fc48 77d48816 76401b9f 00120520 00000405 USER32!GetDC+0x6d
01f6fcb0 77d489cd 00136120 76401b9f 00120520 USER32!GetDC+0x14f
01f6fd10 77d48a10 01f6fd68 00000000 01f6fd8c USER32!GetWindowLongW+0x12 7
01f6fd20 7628155a 01f6fd68 00000000 76280000 USER32!DispatchMessageW+0x f
01f6fd8c 76283746 76280000 00000000 00040338 stobject+0x155a
01f6ffb4 7c80b50b 00000000 00000000 00000000 stobject!DllCanUnloadNow+0 x1fa4
01f6ffec 00000000 762836f7 00000000 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000001f6f3b8 Â be 94 d4 77 73 e4 d4 77 - 78 00 02 00 4a 00 00 00 Â ...ws..wx...J...
0000000001f6f3c8 Â 20 05 12 00 48 f4 f6 01 - e4 f3 f6 01 b2 02 00 00 Â ...H...........
0000000001f6f3d8 Â 00 00 00 00 f4 fb f6 01 - 01 00 00 00 03 00 00 00 Â ................
0000000001f6f3e8 Â a0 0f 00 00 00 00 00 00 - 00 00 00 00 1c f4 f6 01 Â ................
0000000001f6f3f8 Â ab e4 d4 77 78 00 02 00 - 4a 00 00 00 20 05 12 00 Â ...wx...J... ...
0000000001f6f408 Â 48 f4 f6 01 03 00 00 00 - a0 0f 00 00 5c f4 f6 01 Â H...........\...
0000000001f6f418 Â 00 00 00 00 28 f8 f6 01 - 37 1c a2 7c 78 00 02 00 Â ....(...7..|x...
0000000001f6f428 Â 4a 00 00 00 20 05 12 00 - 48 f4 f6 01 03 00 00 00 Â J... ...H.......
0000000001f6f438 Â a0 0f 00 00 5c f4 f6 01 - 9f 1b 40 76 00 00 00 00 Â ....\.....@v....
0000000001f6f448 Â 01 00 00 00 c0 03 00 00 - 64 f4 f6 01 3c f8 f6 01 Â ........d...<...
0000000001f6f458 Â 78 00 02 00 00 00 00 00 - 3f 00 00 00 23 34 75 34 Â x.......?...#4u4
0000000001f6f468 Â 01 00 00 00 b8 03 00 00 - 20 05 12 00 00 00 00 00 Â ........ .......
0000000001f6f478 Â 0a 00 00 00 00 00 00 00 - 3d 07 6a 00 00 00 00 00 Â ........=.j.....
0000000001f6f488 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f498 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f4a8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f4b8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f4c8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f4d8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f4e8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
Ok, I took out my video card and installed an old one that I had about 3 months ago. Â It is an NVidia GeForce FX 5200. Â Today, I opened a project that I have in an application called Proshow that creates DVD out of pictures, anyway, left it running and when I got back, I got the BSOD. Â
I got the minidump and still can't figure it out. Â I ran Dr.Watson and this is the output I got. Â Hope it helps. Â Any suggestions?
Â
Application exception occurred:
    App: C:\WINDOWS\explorer.exe (pid=120044)
    When: 1/14/2006 @ 22:02:19.100
    Exception number: c0000005 (access violation)
*----> System Information <----*
    Computer Name: SKULL
    User Name: Danny V
    Terminal Session Id: 0
    Number of Processors: 1
    Processor Type: x86 Family 6 Model 8 Stepping 1
    Windows Version: 5.1
    Current Build: 2600
    Service Pack: 2
    Current Type: Uniprocessor Free
    Registered Organization:
    Registered Owner: Danny
*----> Task List <----*
  0 System Process
  4 System
 640 smss.exe
 712 csrss.exe
 740 winlogon.exe
 784 services.exe
 804 lsass.exe
 984 svchost.exe
1068 svchost.exe
1212 svchost.exe
1240 StyleXPService.exe
1372 svchost.exe
1488 SDMCP.exe
1496 svchost.exe
1724 spoolsv.exe
1992 avgamsvr.exe
2028 avgupsvc.exe
2044 avgemc.exe
 172 Error 0xD0000022
 188 CTsvcCDA.exe
 220 nvsvc32.exe
 300 ScsiAccess.exe
 688 svchost.exe
 916 WRSSSDK.exe
1356 avgcc.exe
1364 CTSysVol.exe
1368 CTDVDDET.EXE
1396 CTHELPER.EXE
1416 tfswctrl.exe
1484 gcasServ.exe
1532 RUNDLL32.EXE
1564 SpySweeper.exe
1596 Error 0xD0000022
1616 wdfmgr.exe
1784 Error 0xD0000022
1856 ctfmon.exe
2068 MsPMSPSv.exe
2308 MemTurbo.exe
2348 YahooWidgetEngine.exe
2520 YahooWidgetEngine.exe
2660 gcasDtServ.exe
3088 alg.exe
3732 YahooWidgetEngine.exe
3876 YahooWidgetEngine.exe
3932 YahooWidgetEngine.exe
4052 YahooWidgetEngine.exe
1160 YahooWidgetEngine.exe
1592 YahooWidgetEngine.exe
2120 YahooWidgetEngine.exe
2476 YahooWidgetEngine.exe
1204 svchost.exe
3484 DOpus.exe
67336 MontageProSH.exe
67340 Thumbs.exe
70764 iexplore.exe
117644 launcher.exe
120044 explorer.exe
119036 hpgs2wnf.exe
119460 NOTEPAD.EXE
118820 setup2.0.exe
118272 INS4F.tmp
120456 drwtsn32.exe
*----> Module List <----*
(0000000001000000 - 00000000010ff000: C:\WINDOWS\explorer.exe
(0000000001630000 - 00000000018f6000: C:\WINDOWS\system32\msi.dl
(0000000001cc0000 - 0000000001cd0000: C:\WINDOWS\system32\ctagen
(00000000021b0000 - 00000000022b6000: F:\Apps\TrueLaunchBar\tlb.
(0000000010000000 - 0000000010016000: C:\PROGRA~1\COMMON~1\stard
(0000000010040000 - 00000000100b5000: F:\Apps\Directory Opus\dopuslib.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2r
(000000004d4f0000 - 000000004d548000: C:\WINDOWS\system32\WINHTT
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxThem
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\System32\themeu
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEn
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenr
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HEL
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\System32\WSOCK3
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dl
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanm
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxpr
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.
(0000000074980000 - 0000000074ab0000: C:\WINDOWS\system32\msxml3
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\System32\POWRPR
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\System32\BatMet
(0000000074b30000 - 0000000074b76000: C:\WINDOWS\System32\webche
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTU
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davcln
(0000000075f80000 - 000000007607d000: C:\WINDOWS\system32\BROWSE
(0000000076280000 - 00000000762a1000: C:\WINDOWS\System32\stobje
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG3
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHE
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKIN
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshru
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USEREN
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRU
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEH
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpa
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutil
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP3
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCAT
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININE
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Micr
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.
(0000000077760000 - 00000000778ce000: C:\WINDOWS\system32\SHDOCV
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPA
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT3
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHel
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM3
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSIO
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAP
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\System32\Secur3
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL3
*----> State Dump for Thread Id 0x1d4d4 <----*
eax=00000009 ebx=00000003 ecx=0000012e edx=0000029a esi=00133120 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0 Â Â Â Â nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000202
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\ntdll.
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\SHELL3
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\explorer.exe
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\kernel
ChildEBP RetAddr  Args to Child       Â
0007ff08 7ca0be38 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 00133120 7ffde000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 0002066e explorer+0x16e95
0007ffc0 7c816d4f 001587e8 0006e890 7ffde000 explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341 kernel32!RegisterWaitForIn
*----> Raw Stack Dump <----*
000000000007fef0 Â 18 94 d4 77 a2 3b a2 7c - ac 92 80 7c 20 31 13 00 Â ...w.;.|...| 1..
000000000007ff00  20 31 13 00 14 ff 07 00 - 14 ff 07 00 38 be a0 7c  1..........8..|
000000000007ff10 Â 00 00 00 00 5c ff 07 00 - 95 6e 01 01 20 31 13 00 Â ....\....n.. 1..
000000000007ff20 Â 00 e0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00 Â ............$...
000000000007ff30  50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c ed aa 80 7c  P.......'..|...|
000000000007ff40 Â ff ff ff ff 0c 00 00 00 - 00 00 00 00 e5 97 32 05 Â ..............2.
000000000007ff50 Â a8 00 00 00 01 00 00 00 - 20 31 13 00 c0 ff 07 00 Â ........ 1......
000000000007ff60 Â b6 e2 01 01 00 00 00 00 - 00 00 00 00 6e 06 02 00 Â ............n...
000000000007ff70 Â 05 00 00 00 e8 87 15 00 - 90 e8 06 00 44 00 00 00 Â ............D...
000000000007ff80 Â c0 06 02 00 a0 06 02 00 - 70 06 02 00 00 00 00 00 Â ........p.......
000000000007ff90 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 2e 00 00 00 Â ................
000000000007ffa0 Â 00 00 00 00 3a ef 06 00 - 01 00 00 00 05 00 00 00 Â ....:...........
000000000007ffb0 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
000000000007ffc0 Â f0 ff 07 00 4f 6d 81 7c - e8 87 15 00 90 e8 06 00 Â ....Om.|........
000000000007ffd0 Â 00 e0 fd 7f 38 a9 54 80 - c8 ff 07 00 18 b7 af 85 Â ....8.T.........
000000000007ffe0 Â ff ff ff ff f3 99 83 7c - 58 6d 81 7c 00 00 00 00 Â .......|Xm.|....
000000000007fff0 Â 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00 Â ........N.......
0000000000080000 Â 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Â Actx ........$..
0000000000080010 Â c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00 Â ........ .......
0000000000080020 Â 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00 Â ............4...
*----> State Dump for Thread Id 0x1d508 <----*
eax=01916d9c ebx=00000000 ecx=01916d9c edx=000a5b7c esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=00e3fe1c ebp=00e3ff80 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
00e3ff80 77e76c22 00e3ffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
00e3ff88 77e76a3b 000d0dc0 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5
00e3ffa8 77e76c0a 000d0c78 00e3ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4
00e3ffb4 7c80b50b 000e0978 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5
00e3ffec 00000000 77e76bf0 000e0978 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000000e3fe1c  99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff e3 00  ...|.g.w....p...
0000000000e3fe2c  00 00 00 00 a0 2f 0e 00 - 4c ff e3 00 04 00 00 00  ...../..L.......
0000000000e3fe3c  f8 fd 3f 01 00 00 00 00 - a8 da 38 e2 80 e5 ab 89  ..?.......8.....
0000000000e3fe4c  48 2d da b5 00 00 00 00 - f8 fd 3f 01 00 00 00 00  H-........?.....
0000000000e3fe5c  98 e5 ab 89 80 e5 ab 89 - 48 2d da b5 fd bc 56 80  ........H-....V.
0000000000e3fe6c  64 2d da b5 cc fd 3f 01 - 34 bc 56 80 00 00 00 00  d-....?.4.V.....
0000000000e3fe7c  00 00 00 00 00 00 00 00 - a8 da 38 e2 98 cb 01 00  ..........8.....
0000000000e3fe8c  01 6a 56 80 00 00 00 00 - 20 2c da b5 00 00 00 00  .jV..... ,......
0000000000e3fe9c  00 00 00 00 d8 fd 3f 01 - 9c cb 01 00 00 00 00 00  ......?.........
0000000000e3feac  c0 da 38 e2 38 e7 18 e1 - 29 c9 33 e4 b8 2b da b5  ..8.8...).3..+..
0000000000e3febc  07 00 00 00 b8 03 d0 89 - 18 2c da b5 18 00 00 00  .........,......
0000000000e3fecc  d0 a5 bd e2 01 fd 3f 01 - 18 00 00 00 d0 a5 bd e2  ......?.........
0000000000e3fedc  01 fd 3f 01 8d 3c 56 80 - f8 2c da b5 00 00 00 00  ..?..<V..,......
0000000000e3feec  d8 fd 3f 01 f8 2c da b5 - 18 2c da b5 f8 2c da b5  ..?..,...,...,..
0000000000e3fefc  18 2c da b5 d8 fd 3f 01 - d0 a5 bd e2 b8 a5 bd e2  .,....?.........
0000000000e3ff0c  d8 a2 ad 85 14 2c da b5 - 54 8a ad 85 24 2c da b5  .....,..T...$,..
0000000000e3ff1c  b2 c2 4d 80 ba c2 4d 80 - 24 8a ad 85 b8 88 ad 85  ..M...M.$.......
0000000000e3ff2c  ec 88 ad 85 80 ff e3 00 - 99 66 e7 77 4c ff e3 00  .........f.wL...
0000000000e3ff3c  a9 66 e7 77 ed 10 90 7c - 00 f7 0d 00 78 09 0e 00  .f.w...|....x...
0000000000e3ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......
*----> State Dump for Thread Id 0x1d50c <----*
eax=774fe429 ebx=00007530 ecx=7ffde000 edx=00000000 esi=000001c0 edi=00000000
eip=7c90eb94 esp=00e8ff28 ebp=00e8ff8c iopl=0 Â Â Â Â nv up ei ng nz ac po cy
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000297
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\ole32.
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
00e8ff8c 774fe407 000001c0 00007530 00000000 ntdll!KiFastSystemCallRet
00e8ffb4 7c80b50b 000e30d0 7c910945 7c91094e ole32!StringFromGUID2+0x60
00e8ffec 00000000 774fe429 000e30d0 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000000e8ff28 Â c0 e9 90 7c db 25 80 7c - c0 01 00 00 00 00 00 00 Â ...|.%.|........
0000000000e8ff38 Â 5c ff e8 00 50 25 80 7c - d0 30 0e 00 30 75 00 00 Â \...P%.|.0..0u..
0000000000e8ff48 Â 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e8ff58  10 00 00 00 00 5d 1e ee - ff ff ff ff 00 e0 fd 7f  .....]..........
0000000000e8ff68 Â 00 b0 fd 7f 5c ff e8 00 - 58 24 80 7c 3c ff e8 00 Â ....\...X$.|<...
0000000000e8ff78  0f 24 80 7c dc ff e8 00 - f3 99 83 7c 08 26 80 7c  .$.|.......|.&.|
0000000000e8ff88 Â 00 00 00 00 b4 ff e8 00 - 07 e4 4f 77 c0 01 00 00 Â ..........Ow....
0000000000e8ff98 Â 30 75 00 00 00 00 00 00 - 45 09 91 7c d0 30 0e 00 Â 0u......E..|.0..
0000000000e8ffa8 Â 00 00 4e 77 44 e4 4f 77 - 4e 09 91 7c ec ff e8 00 Â ..NwD.OwN..|....
0000000000e8ffb8  0b b5 80 7c d0 30 0e 00 - 45 09 91 7c 4e 09 91 7c  ...|.0..E..|N..|
0000000000e8ffc8 Â d0 30 0e 00 00 b0 fd 7f - 00 26 eb 89 c0 ff e8 00 Â .0.......&......
0000000000e8ffd8  10 55 0d 88 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  .U.........|...|
0000000000e8ffe8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 29 e4 4f 77 Â ............).Ow
0000000000e8fff8 Â d0 30 0e 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â .0..............
0000000000e90008 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e90018 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e90028 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e90038 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e90048 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000e90058 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
*----> State Dump for Thread Id 0x1d510 <----*
eax=022ddfa8 ebx=0000001c ecx=0000c055 edx=7c90eb94 esi=022ddfa8 edi=000905dc
eip=021f6eb2 esp=00ecfd60 ebp=0001caa8 iopl=0 Â Â Â Â nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000202
*** WARNING: Unable to verify checksum for F:\Apps\TrueLaunchBar\tlb.
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for F:\Apps\TrueLaunchBar\tlb.
function: tlb
    021f6e97 6c        insb
    021f6e98 2428       and   al,0x28
    021f6e9a 8b5c2420     mov   ebx,[esp+0x20]
    021f6e9e 7419       jz    tlb+0x46eb9 (021f6eb9)
    021f6ea0 68a0832502    push   0x22583a0
    021f6ea5 57        push   edi
    021f6ea6 ff15f4262702   call   dword ptr [tlb+0xc26f4 (022726f4)]
    021f6eac 8bf0       mov   esi,eax
    021f6eae 85f6       test   esi,esi
    021f6eb0 7407       jz    tlb+0x46eb9 (021f6eb9)
FAULT ->021f6eb2 397e10      cmp   [esi+0x10],edi   ds:0023:022ddfb8=????????
    021f6eb5 7407       jz    tlb+0x46ebe (021f6ebe)
    021f6eb7 33f6       xor   esi,esi
    021f6eb9 83fb01      cmp   ebx,0x1
    021f6ebc 754a       jnz   tlb+0x46f08 (021f6f08)
    021f6ebe 81fb13010000   cmp   ebx,0x113
    021f6ec4 0f87b3000000   jnbe   tlb+0x46f7d (021f6f7d)
    021f6eca 0f8495000000   je    tlb+0x46f65 (021f6f65)
    021f6ed0 8d43ff      lea   eax,[ebx-0x1]
    021f6ed3 83f820      cmp   eax,0x20
    021f6ed6 7730       ja    tlb+0x46f08 (021f6f08)
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
0001caa8 00000000 00000000 00000000 00000000 tlb+0x46eb2
*----> Raw Stack Dump <----*
0000000000ecfd60 Â dc fd ec 00 80 6e 1f 02 - a0 fd ec 00 00 00 00 00 Â .....n..........
0000000000ecfd70 Â 83 d1 00 00 a0 fd ec 00 - 34 87 d4 77 dc 05 09 00 Â ........4..w....
0000000000ecfd80 Â 1c 00 00 00 00 00 00 00 - a8 ca 01 00 80 6e 1f 02 Â .............n..
0000000000ecfd90 Â cd ab ba dc 00 00 00 00 - dc fd ec 00 80 6e 1f 02 Â .............n..
0000000000ecfda0 Â 08 fe ec 00 16 88 d4 77 - 80 6e 1f 02 dc 05 09 00 Â .......w.n......
0000000000ecfdb0 Â 1c 00 00 00 00 00 00 00 - a8 ca 01 00 28 2e 0f 00 Â ............(...
0000000000ecfdc0 Â dc 05 09 00 02 01 00 00 - 14 00 00 00 01 00 00 00 Â ................
0000000000ecfdd0 Â 00 00 00 00 28 2e 0f 00 - 00 00 00 00 00 00 00 00 Â ....(...........
0000000000ecfde0 Â ff ff ff ff 01 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000ecfdf0 Â bc fd ec 00 84 f9 ec 00 - 4c fe ec 00 67 04 d7 77 Â ........L...g..w
0000000000ecfe00 Â 30 88 d4 77 00 00 00 00 - 5c fe ec 00 c0 b4 d4 77 Â 0..w....\......w
0000000000ecfe10 Â 28 2e 0f 00 80 6e 1f 02 - dc 05 09 00 1c 00 00 00 Â (....n..........
0000000000ecfe20 Â 00 00 00 00 a8 ca 01 00 - cc ee 62 00 01 00 00 00 Â ..........b.....
0000000000ecfe30 Â 00 00 00 00 28 ff ec 00 - 02 01 00 00 d9 8b d4 77 Â ....(..........w
0000000000ecfe40 Â 00 00 00 00 30 fe ec 00 - 84 f9 ec 00 dc ff ec 00 Â ....0...........
0000000000ecfe50 Â 67 04 d7 77 d0 b4 d4 77 - ff ff ff ff 84 fe ec 00 Â g..w...w........
0000000000ecfe60 Â 0c b5 d4 77 b8 ee 62 00 - 1c 00 00 00 00 00 00 00 Â ...w..b.........
0000000000ecfe70 Â a8 ca 01 00 80 6e 1f 02 - 00 00 00 00 00 00 00 00 Â .....n..........
0000000000ecfe80 Â 00 00 00 00 d4 fe ec 00 - e3 ea 90 7c 94 fe ec 00 Â ...........|....
0000000000ecfe90 Â 18 00 00 00 b8 ee 62 00 - 1c 00 00 00 00 00 00 00 Â ......b.........
*----> State Dump for Thread Id 0x1d514 <----*
eax=7c92798d ebx=00000000 ecx=77dd6a51 edx=77dd6a18 esi=ffffffff edi=7c90fb78
eip=7c90eb94 esp=00f0ff9c ebp=00f0ffb4 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
00f0ffb4 7c80b50b 00000000 7c90fb78 ffffffff ntdll!KiFastSystemCallRet
00f0ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000000f0ff9c  5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff f0 00  \..|.y.|........
0000000000f0ffac  00 00 00 00 00 00 00 80 - ec ff f0 00 0b b5 80 7c  ...............|
0000000000f0ffbc  00 00 00 00 78 fb 90 7c - ff ff ff ff 00 00 00 00  ....x..|........
0000000000f0ffcc  00 90 fd 7f 00 26 eb 89 - c0 ff f0 00 78 fb e4 87  .....&......x...
0000000000f0ffdc  ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00  .......|...|....
0000000000f0ffec  00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00  .........y.|....
0000000000f0fffc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1000c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1001c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1002c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1003c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1004c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1005c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1006c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1007c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1008c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f1009c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f100ac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f100bc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f100cc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
*----> State Dump for Thread Id 0x1d518 <----*
eax=000d9b48 ebx=00000000 ecx=64710003 edx=64700002 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=00f4ff70 ebp=00f4ffb4 iopl=0 Â Â Â Â nv up ei ng nz na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000286
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
00f4ffb4 7c80b50b 00000000 00ecfce4 00ecfce8 ntdll!KiFastSystemCallRet
00f4ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000000f4ff70 Â 1b e3 90 7c 9d 07 91 7c - ec 01 00 00 ac ff f4 00 Â ...|...|........
0000000000f4ff80 Â b0 ff f4 00 98 ff f4 00 - a0 ff f4 00 e4 fc ec 00 Â ................
0000000000f4ff90 Â e8 fc ec 00 00 00 00 00 - 00 00 00 00 b0 c0 92 01 Â ................
0000000000f4ffa0  00 7c 28 e8 ff ff ff ff - 35 5c 70 80 69 75 92 7c  .|(.....5\p.iu.|
0000000000f4ffb0 Â 70 39 13 00 ec ff f4 00 - 0b b5 80 7c 00 00 00 00 Â p9.........|....
0000000000f4ffc0  e4 fc ec 00 e8 fc ec 00 - 00 00 00 00 00 80 fd 7f  ................
0000000000f4ffd0  00 26 eb 89 c0 ff f4 00 - 78 fb e4 87 ff ff ff ff  .&......x.......
0000000000f4ffe0 Â f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 Â ...|...|........
0000000000f4fff0 Â 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 Â ....`..|........
0000000000f50000 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50010 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50020 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50030 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50040 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50050 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50060 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50070 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50080 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f50090 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000000f500a0 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
*----> State Dump for Thread Id 0x1d51c <----*
eax=000000c0 ebx=00000000 ecx=00ecfb00 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=00f8fcec ebp=00f8ffb4 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
00f8ffb4 7c80b50b 00000000 00000020 00ecfce4 ntdll!KiFastSystemCallRet
00f8ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000000f8fcec  ab e9 90 7c d5 a0 92 7c - 03 00 00 00 30 fd f8 00  ...|...|....0...
0000000000f8fcfc  01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00  ............ ...
0000000000f8fd0c  e4 fc ec 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c  ...........|...|
0000000000f8fd1c  f4 01 00 00 1c d5 01 00 - 03 00 00 00 03 00 00 00  ................
0000000000f8fd2c  02 00 00 00 f0 01 00 00 - d8 01 00 00 b0 04 00 00  ................
0000000000f8fd3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fd9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdbc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdcc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fddc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fdfc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fe0c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000000f8fe1c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
*----> State Dump for Thread Id 0x1d524 <----*
eax=00fe0010 ebx=001077d0 ecx=00001000 edx=7c90eb94 esi=00000000 edi=7ffde000
eip=7c90eb94 esp=015efd30 ebp=015efdcc iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\USER32
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
015efdcc 77d495f9 00000009 015efdf4 00000000 ntdll!KiFastSystemCallRet
015efe28 7c9f4e37 00000008 015efe50 ffffffff USER32!GetLastInputInfo+0x
015eff4c 7ca0a334 77f74292 00000000 7c809988 SHELL32!Ordinal646+0x21e2
015effb4 7c80b50b 00000000 7c809988 00090000 SHELL32!Ordinal753+0x133
015effec 00000000 77f74223 00ecf4d4 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
00000000015efd30 Â ab e9 90 7c f2 94 80 7c - 09 00 00 00 d0 77 10 00 Â ...|...|.....w..
00000000015efd40 Â 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
00000000015efd50 Â 09 00 00 00 02 00 00 00 - 18 bd 5a 00 14 00 00 00 Â ..........Z.....
00000000015efd60 Â 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 Â ................
00000000015efd70 Â 00 00 00 00 30 00 00 00 - 14 00 00 00 01 00 00 00 Â ....0...........
00000000015efd80 Â 60 d1 0e 00 00 00 00 00 - 00 00 00 00 ec fd 5e 01 Â `.............^.
00000000015efd90  67 04 d7 77 30 88 d4 77 - 00 e0 fd 7f 00 60 fd 7f  g..w0..w.....`..
00000000015efda0 Â 00 60 fd 7f 00 00 00 00 - d0 77 10 00 e2 00 06 00 Â .`.......w......
00000000015efdb0 Â 09 00 00 00 4c fd 5e 01 - 00 00 00 00 dc ff 5e 01 Â ....L.^.......^.
00000000015efdc0 Â f3 99 83 7c 90 95 80 7c - 00 00 00 00 28 fe 5e 01 Â ...|...|....(.^.
00000000015efdd0 Â f9 95 d4 77 09 00 00 00 - f4 fd 5e 01 00 00 00 00 Â ...w......^.....
00000000015efde0 Â ff ff ff ff 01 00 00 00 - 80 b5 11 00 08 00 00 00 Â ................
00000000015efdf0 Â 00 00 00 00 bc 04 00 00 - 5c 04 00 00 0c 03 00 00 Â ........\.......
00000000015efe00 Â e0 02 00 00 e4 02 00 00 - 38 02 00 00 40 02 00 00 Â ........8...@...
00000000015efe10 Â 44 02 00 00 14 02 00 00 - 00 00 00 00 01 00 00 00 Â D...............
00000000015efe20  00 60 fd 7f 14 02 00 00 - 4c ff 5e 01 37 4e 9f 7c  .`......L.^.7N.|
00000000015efe30 Â 08 00 00 00 50 fe 5e 01 - ff ff ff ff ff 04 00 00 Â ....P.^.........
00000000015efe40 Â f4 fd 5e 01 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ..^.............
00000000015efe50 Â bc 04 00 00 5c 04 00 00 - 0c 03 00 00 e0 02 00 00 Â ....\...........
00000000015efe60 Â e4 02 00 00 38 02 00 00 - 40 02 00 00 44 02 00 00 Â ....8...@...D...
*----> State Dump for Thread Id 0x1d580 <----*
eax=7751a2bf ebx=00000000 ecx=00000000 edx=00000008 esi=01b8ff98 edi=00000000
eip=7c90eb94 esp=01b8ff58 ebp=01b8ff74 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\system32\NETSHE
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
01b8ff74 764434cb 01b8ff98 00000000 00000000 ntdll!KiFastSystemCallRet
01b8ffb4 7c80b50b 76476328 00000000 7c900000 NETSHELL!NetSetupSetProgre
01b8ffec 00000000 7644348c 76476328 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000001b8ff58 Â be 91 d4 77 f1 91 d4 77 - 98 ff b8 01 00 00 00 00 Â ...w...w........
0000000001b8ff68 Â 00 00 00 00 00 00 00 00 - c6 91 d4 77 b4 ff b8 01 Â ...........w....
0000000001b8ff78 Â cb 34 44 76 98 ff b8 01 - 00 00 00 00 00 00 00 00 Â .4Dv............
0000000001b8ff88 Â 00 00 00 00 00 00 90 7c - 00 00 00 00 28 63 47 76 Â .......|....(cGv
0000000001b8ff98 Â 00 00 00 00 00 00 00 00 - 81 a8 4f 80 9c 4c 50 b8 Â ..........O..LP.
0000000001b8ffa8 Â 35 5c 70 80 00 00 00 00 - dc e2 90 7c ec ff b8 01 Â 5\p........|....
0000000001b8ffb8  0b b5 80 7c 28 63 47 76 - 00 00 00 00 00 00 90 7c  ...|(cGv.......|
0000000001b8ffc8 Â 28 63 47 76 00 d0 fa 7f - 00 26 eb 89 c0 ff b8 01 Â (cGv.....&......
0000000001b8ffd8  a8 fe d5 89 ff ff ff ff - f3 99 83 7c 18 b5 80 7c  ...........|...|
0000000001b8ffe8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 8c 34 44 76 Â .............4Dv
0000000001b8fff8 Â 28 63 47 76 00 00 00 00 - c8 00 00 00 6b 01 00 00 Â (cGv........k...
0000000001b90008 Â ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00 Â ................
0000000001b90018 Â 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 Â ..... ....... ..
0000000001b90028 Â e8 01 00 00 ff ef fd 7f - 0c 00 08 06 00 00 00 00 Â ................
0000000001b90038 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 98 05 b9 01 Â ................
0000000001b90048 Â 0f 00 00 00 f8 ff ff ff - 50 00 b9 01 50 00 b9 01 Â ........P...P...
0000000001b90058 Â 40 06 b9 01 00 00 00 00 - 00 00 00 00 00 00 00 00 Â @...............
0000000001b90068 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001b90078 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001b90088 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
*----> State Dump for Thread Id 0x1d590 <----*
eax=77e76bf0 ebx=00000000 ecx=0000000c edx=003c3750 esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=01cafe1c ebp=01caff80 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
01caff80 77e76c22 01caffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
01caff88 77e76a3b 000d0dc0 00000000 003c0178 RPCRT4!I_RpcBCacheFree+0x5
01caffa8 77e76c0a 000d0c78 01caffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4
01caffb4 7c80b50b 0190e658 00000000 003c0178 RPCRT4!I_RpcBCacheFree+0x5
01caffec 00000000 77e76bf0 0190e658 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000001cafe1c  99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff ca 01  ...|.g.w....p...
0000000001cafe2c  00 00 00 00 10 5a 90 01 - 4c ff ca 01 00 00 00 00  .....Z..L.......
0000000001cafe3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe4c  00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe6c  ea 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001cafe8c  00 00 00 00 00 00 00 00 - d4 3b eb b5 40 19 56 80  .........;..@.V.
0000000001cafe9c  e1 a9 54 80 00 00 00 00 - f8 e9 c7 89 80 d8 c7 89  ..T.............
0000000001cafeac  00 00 00 00 00 00 00 00 - 00 00 00 00 e4 93 49 f7  ..............I.
0000000001cafebc  18 1e e3 89 02 00 00 00 - a8 1d e3 89 a8 1d e3 89  ................
0000000001cafecc  c0 3b eb b5 1f 41 4e 80 - c8 e9 bb 89 98 ed 3e 88  .;...AN.......>.
0000000001cafedc  06 02 00 00 9d b7 4d 80 - 02 00 00 00 52 41 4e 80  ......M.....RAN.
0000000001cafeec  98 ed 3e 88 00 00 00 00 - f4 3b eb b5 5b 89 4a f7  ..>......;..[.J.
0000000001cafefc  dc 93 49 f7 a0 ed 3e 88 - f8 e9 c7 89 80 d8 c7 89  ..I...>.........
0000000001caff0c  78 5a 97 b9 7a 89 4a f7 - bc 31 b7 85 24 3c eb b5  xZ..z.J..1..$<..
0000000001caff1c  b2 c2 4d 80 ba c2 4d 80 - 8c 31 b7 85 20 30 b7 85  ..M...M..1.. 0..
0000000001caff2c  54 30 b7 85 80 ff ca 01 - 99 66 e7 77 4c ff ca 01  T0.......f.wL...
0000000001caff3c  a9 66 e7 77 ed 10 90 7c - f0 23 90 01 58 e6 90 01  .f.w...|.#..X...
0000000001caff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......
*----> State Dump for Thread Id 0x1d634 <----*
eax=77e76bf0 ebx=00000000 ecx=00090178 edx=00090000 esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=01e3fe1c ebp=01e3ff80 iopl=0 Â Â Â Â nv up ei pl zr na po nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000246
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr  Args to Child       Â
01e3ff80 77e76c22 01e3ffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
01e3ff88 77e76a3b 000d0dc0 01b931e8 00000018 RPCRT4!I_RpcBCacheFree+0x5
01e3ffa8 77e76c0a 000d0c78 01e3ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4
01e3ffb4 7c80b50b 001313c8 01b931e8 00000018 RPCRT4!I_RpcBCacheFree+0x5
01e3ffec 00000000 77e76bf0 001313c8 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000001e3fe1c  99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff e3 01  ...|.g.w....p...
0000000001e3fe2c  00 00 00 00 c8 00 92 01 - 54 ff e3 01 00 00 00 00  ........T.......
0000000001e3fe3c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe4c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe5c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe6c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe7c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe8c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fe9c  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3feac  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3febc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fecc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fedc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3feec  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00  ................
0000000001e3fefc  00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 01  ................
0000000001e3ff0c  00 00 00 01 00 00 00 01 - bc 51 b0 85 24 dc ff b7  .........Q..$...
0000000001e3ff1c  b2 c2 4d 80 ba c2 4d 80 - 8c 51 b0 85 20 50 b0 85  ..M...M..Q.. P..
0000000001e3ff2c  54 50 b0 85 80 ff e3 01 - 99 66 e7 77 4c ff e3 01  TP.......f.wL...
0000000001e3ff3c  a9 66 e7 77 ed 10 90 7c - f0 04 13 00 c8 13 13 00  .f.w...|........
0000000001e3ff4c  00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff  ../M.....]......
*----> State Dump for Thread Id 0x1d684 <----*
eax=00000004 ebx=000003b8 ecx=002826a0 edx=7f6f0801 esi=0000004a edi=01f6f45c
eip=7c90eb94 esp=01f6f3b8 ebp=01f6f3f4 iopl=0 Â Â Â Â nv up ei pl nz na pe nc
cs=001b  ss=0023  ds=0023  es=0023  fs=003b  gs=0000       efl=00000202
function: ntdll!KiFastSystemCallRet
    7c90eb89 90        nop
    7c90eb8a 90        nop
    ntdll!KiFastSystemCall:
    7c90eb8b 8bd4       mov   edx,esp
    7c90eb8d 0f34       sysenter
    7c90eb8f 90        nop
    7c90eb90 90        nop
    7c90eb91 90        nop
    7c90eb92 90        nop
    7c90eb93 90        nop
    ntdll!KiFastSystemCallRet:
    7c90eb94 c3        ret
    7c90eb95 8da42400000000  lea   esp,[esp]
    7c90eb9c 8d642400     lea   esp,[esp]
    7c90eba0 90        nop
    7c90eba1 90        nop
    7c90eba2 90        nop
    7c90eba3 90        nop
    7c90eba4 90        nop
    ntdll!KiIntSystemCall:
    7c90eba5 8d542408     lea   edx,[esp+0x8]
    7c90eba9 cd2e       int   2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Â Defaulted to export symbols for C:\WINDOWS\System32\stobje
ChildEBP RetAddr  Args to Child       Â
01f6f3f4 77d4e4ab 00020078 0000004a 00120520 ntdll!KiFastSystemCallRet
01f6f41c 7ca21c37 00020078 0000004a 00120520 USER32!SendMessageTimeoutW
01f6f828 7645476d 00000001 01f6f83c 01f6fc84 SHELL32!Shell_NotifyIconW+
01f6fbf8 76454c4a 00000000 000000be 01f6fc1c NETSHELL!NetSetupSetProgre
01f6fc08 7640f555 00120520 00000000 000000be NETSHELL!NetSetupSetProgre
01f6fc1c 77d48734 00120520 00000405 00000000 NETSHELL!NormalizeExtended
01f6fc48 77d48816 76401b9f 00120520 00000405 USER32!GetDC+0x6d
01f6fcb0 77d489cd 00136120 76401b9f 00120520 USER32!GetDC+0x14f
01f6fd10 77d48a10 01f6fd68 00000000 01f6fd8c USER32!GetWindowLongW+0x12
01f6fd20 7628155a 01f6fd68 00000000 76280000 USER32!DispatchMessageW+0x
01f6fd8c 76283746 76280000 00000000 00040338 stobject+0x155a
01f6ffb4 7c80b50b 00000000 00000000 00000000 stobject!DllCanUnloadNow+0
01f6ffec 00000000 762836f7 00000000 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000001f6f3b8 Â be 94 d4 77 73 e4 d4 77 - 78 00 02 00 4a 00 00 00 Â ...ws..wx...J...
0000000001f6f3c8 Â 20 05 12 00 48 f4 f6 01 - e4 f3 f6 01 b2 02 00 00 Â ...H...........
0000000001f6f3d8 Â 00 00 00 00 f4 fb f6 01 - 01 00 00 00 03 00 00 00 Â ................
0000000001f6f3e8 Â a0 0f 00 00 00 00 00 00 - 00 00 00 00 1c f4 f6 01 Â ................
0000000001f6f3f8 Â ab e4 d4 77 78 00 02 00 - 4a 00 00 00 20 05 12 00 Â ...wx...J... ...
0000000001f6f408 Â 48 f4 f6 01 03 00 00 00 - a0 0f 00 00 5c f4 f6 01 Â H...........\...
0000000001f6f418 Â 00 00 00 00 28 f8 f6 01 - 37 1c a2 7c 78 00 02 00 Â ....(...7..|x...
0000000001f6f428 Â 4a 00 00 00 20 05 12 00 - 48 f4 f6 01 03 00 00 00 Â J... ...H.......
0000000001f6f438 Â a0 0f 00 00 5c f4 f6 01 - 9f 1b 40 76 00 00 00 00 Â ....\.....@v....
0000000001f6f448 Â 01 00 00 00 c0 03 00 00 - 64 f4 f6 01 3c f8 f6 01 Â ........d...<...
0000000001f6f458 Â 78 00 02 00 00 00 00 00 - 3f 00 00 00 23 34 75 34 Â x.......?...#4u4
0000000001f6f468 Â 01 00 00 00 b8 03 00 00 - 20 05 12 00 00 00 00 00 Â ........ .......
0000000001f6f478 Â 0a 00 00 00 00 00 00 00 - 3d 07 6a 00 00 00 00 00 Â ........=.j.....
0000000001f6f488 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f498 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f4a8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f4b8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f4c8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f4d8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
0000000001f6f4e8 Â 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 Â ................
DrWatson is not useful for Blue screen problem. Attach the minidump at the webspace.
ASKER
Thanks,
My original message indicates the location of my minidump post. Â Here it is
I posted my minidump and a current profile of my system on the following url. Â
http://www.dvalen.com/mini_dumps_files.htm
Thanks
My original message indicates the location of my minidump post. Â Here it is
I posted my minidump and a current profile of my system on the following url. Â
http://www.dvalen.com/mini_dumps_files.htm
Thanks
ASKER
Hello,
I am not sure what to do at this point. Â Test all RAMS both with MEMTEST, DLDiag, and 3Dmark. Â Changed the video card. Â I really don't want to re-install windows again. Â
Any other suggestions.
THanks
Danny
I am not sure what to do at this point. Â Test all RAMS both with MEMTEST, DLDiag, and 3Dmark. Â Changed the video card. Â I really don't want to re-install windows again. Â
Any other suggestions.
THanks
Danny
ASKER
Hello,
Here is an update. I downloaded the latest version of memtest and ran it and got several errors, that it could not write to certain memory ranges. Â
 I made some adjustment to my Bios and swtich some setting to were it indicate that it would create a more stable system.  I made some adjustment o the AGP section and DRAM section.  at this moment I forgot what I adjusted. I ran the memtest again and got no error.  I actually ran it overnight. Â
So far no blue screen. Â I am not sure how else to test it or re-create the BSOD and make sure I don't get it again. Â when I get home later today, I am going to try google earth, because I know that last time I got the BSOD when using the app.
Let me know if you have any suggestions.
Thanks
Danny
Here is an update. I downloaded the latest version of memtest and ran it and got several errors, that it could not write to certain memory ranges. Â
 I made some adjustment to my Bios and swtich some setting to were it indicate that it would create a more stable system.  I made some adjustment o the AGP section and DRAM section.  at this moment I forgot what I adjusted. I ran the memtest again and got no error.  I actually ran it overnight. Â
So far no blue screen. Â I am not sure how else to test it or re-create the BSOD and make sure I don't get it again. Â when I get home later today, I am going to try google earth, because I know that last time I got the BSOD when using the app.
Let me know if you have any suggestions.
Thanks
Danny
well, if you got errors with memtest, i would test the sticks 1 at the time, and check the good (or bad ones)
i would not use a reported bad memory stick again, unless extensive tests show no problem.
You can ruin your files on disk when using bad ram.
i would not use a reported bad memory stick again, unless extensive tests show no problem.
You can ruin your files on disk when using bad ram.
ASKER
Ok, but I re-ran the test again after making some changes in my bios and did not get any error message in memtest. Â What would that mean? Â Why did I not get the error message again?
Thanks
Thanks
Do you downclock the ram?
>>  but I re-ran the test again  << for how long? min  i should run 3 passes
ASKER
Hi,
I would have to check if I downclock the ram, but I really doubt it.
Nobus, - I re-ran the test for about 10 hours overnight and not a single error. Â
Let me know what you think. Â I would I not get the error now?
Danny
I would have to check if I downclock the ram, but I really doubt it.
Nobus, - I re-ran the test for about 10 hours overnight and not a single error. Â
Let me know what you think. Â I would I not get the error now?
Danny
ASKER CERTIFIED SOLUTION
membership
Create a free account to see this answer
Signing up is free and takes 30 seconds. No credit card required.
ASKER
Thanks,
I applied the changes based on the manual I have, but since I am here at work, I can't remember what changes I made. Â When I was making the changes, I obviously knew what changes I was making. Â All I can remember right now is I disable something for the AGP. Â I also now remembering that I changed the RAM to be used for AGP from 256mb to 128mb. Â
Thanks
Danny
I applied the changes based on the manual I have, but since I am here at work, I can't remember what changes I made. Â When I was making the changes, I obviously knew what changes I was making. Â All I can remember right now is I disable something for the AGP. Â I also now remembering that I changed the RAM to be used for AGP from 256mb to 128mb. Â
Thanks
Danny
ASKER
I have not had a BSOD in a week. Â I believe the changes that I made in the Bios helped. Â I will post the changes I made when I get home
Thanks all
Danny
Thanks all
Danny
I am the first person to  identify the problem is related to ram (underclock the ram) or video ram. Why I don't get any points ??
Mini030406-01.dmp BugCheck 10000050, {ffbea4e8, 0, f7b5570e, 0}
8874c778: Unable to get thread contents
Mini032306-01.dmp BugCheck 100000D1, {c2e89180, 2, 0, f77efe21}
Probably caused by : usbuhci.sys ( usbuhci!UhciAllocTd+1f )
Mini032306-02.dmp BugCheck 100000EA, {887d82d8, 88b50128, f78aecb4, 1}
DEFAULT_BUCKET_ID: Â GRAPHICS_DRIVER_FAULT
Probably caused by : nv4_mini.sys ( nv4_mini+53d6c )
Mini032506-01.dmp BugCheck 1000008E, {c000001d, f778f684, b6ba8410, 0}
Probably caused by : watchdog.sys ( watchdog!WdExitMonitoredSe
Mini032606-01.dmp BugCheck 100000D1, {5327e686, 2, 0, b7abed59}
Probably caused by : mrxsmb.sys ( mrxsmb!MRxSmbReadHandler_N
Mini032606-02.dmp BugCheck 100000D1, {0, 2, 0, 0}
Finding
Mini032506-01.dmp is crashed with NT status code c000001d (illegal instruction) and it is the sign of faulty ram. Mini032306-02.dmp is crashed with bugcheck code EA and it is the sign of faulty ram or video card.
The culprit is faulty ram (60%), video card (30%) and M/B (10%).
Suugestion
1 Some faulty ram can pass memtest. Reseat the memory to another slot or downclock the ram
2 Run 3DMark 2005 to test your video card