dan5460
asked on
Blue screen galore, random BSOD need help
Hello experts, I have been fighting this problem now for awhile and been searching this site for informaton. I am getting massive BSOD and it seems to be random. I could be doing anything at all and would get it. I ran memtest for about 15 hours and everything went well. I ran all my antispyware programs anti virus program and came clean. I have updated all my drivers and updated Microsoft patches. This is a fairly new re-install of windows as of January of this year.
I tried debugging the minidumps, but I am not sure what I am looking at. It seems that I sometimes have a failure on my USB, Nvidia, and I get IRQ not equal to, just about everything. I really need help to debug and find a solution to this problem
I posted my minidump and a current profile of my system on the following url.
http://www.dvalen.com/mini_dumps_files.htm
Any help will be much appreciated.
Thanks again
Danny
I tried debugging the minidumps, but I am not sure what I am looking at. It seems that I sometimes have a failure on my USB, Nvidia, and I get IRQ not equal to, just about everything. I really need help to debug and find a solution to this problem
I posted my minidump and a current profile of my system on the following url.
http://www.dvalen.com/mini_dumps_files.htm
Any help will be much appreciated.
Thanks again
Danny
If it is an Nvidia chipset on the Mboard or video card, it MUST have RAM with true CL=2.5 and no slower. If you have RAM that is CL3, it will pass all tests, but its refresh is TOO SLOW for Nvidia chipsets. The symptoms you describe are exactly what you get from CL3 RAM chips. My bet is that you do indeed have CL3 ram chips and they will have to be replaced. The BSODs are always random with this problem. CL is the "refresh speed" of the RAM in nanosceonds. If too slow, Nvidia chipset freeze, cant get data fast enough.
test your ram with memtest86+ from : http://www.memtest.org/ ( if you did not use this one )
and do a scan disk for errors on your disk drive.
also, check the CPU temperature if it get's up tto high - check it in the bios.
since you did not post your specs, check if your system is not underppowered, calculate what you need here :
http://www.jscustompcs.com/power_supply/
and do a scan disk for errors on your disk drive.
also, check the CPU temperature if it get's up tto high - check it in the bios.
since you did not post your specs, check if your system is not underppowered, calculate what you need here :
http://www.jscustompcs.com/power_supply/
ASKER
Thanks for the info. I did post my specs on my website as posted above. My cpu temp is at 127F.
As for the Nvidia chipset, do you think I should just get a new video card? If I run the 3Dmark 2005, would it be able to identify if it is indeed the video card or the Ram. It is hard to believe that it would be my Ram.
So I am assuming that based on the comments above that it is either the Video card or my Ram. Is this correct?
Thanks again
Danny
As for the Nvidia chipset, do you think I should just get a new video card? If I run the 3Dmark 2005, would it be able to identify if it is indeed the video card or the Ram. It is hard to believe that it would be my Ram.
So I am assuming that based on the comments above that it is either the Video card or my Ram. Is this correct?
Thanks again
Danny
>> either the Video card or my Ram. Is this correct? << those are the most probable.
did you check how much power you need ?
did you check how much power you need ?
ASKER
Yes, I just check it, and it look like i need about 333 watts. Once I get home from work, I will check to see the watt on my PSU. The strange thing is that I did not add anything extra, so I am not sure if it the PSU.
I am guessing that it will probably be the NVidea card, since I noticed that at one time the fan stopped working and I ended up buying a new fan for it. maybe at one point the the card got overheated and now it is faulty. I will check with the 3dmark app.
Thanks
Danny
I am guessing that it will probably be the NVidea card, since I noticed that at one time the fan stopped working and I ended up buying a new fan for it. maybe at one point the the card got overheated and now it is faulty. I will check with the 3dmark app.
Thanks
Danny
you can test your video card by typing dxdiag in the run box, select display tab, and test 2D and 3D
ASKER
Hello,
Here is an update. I ran the dxdiag and everything went fine. No BSOD. I also ran the 3dMark version 2003, which is the only one i currently have and ran every test with no incident. Now, I am not sure what is happening.
As far as the RAM, scrathcyboy mentioned that I might have CL3 instead of CL2.5 How do I find out what I have? If I do have CL3, would I have not gotten this BSOD when I first installed the RAM more then a year ago?
Still not sure what to do.
Thanks
Here is an update. I ran the dxdiag and everything went fine. No BSOD. I also ran the 3dMark version 2003, which is the only one i currently have and ran every test with no incident. Now, I am not sure what is happening.
As far as the RAM, scrathcyboy mentioned that I might have CL3 instead of CL2.5 How do I find out what I have? If I do have CL3, would I have not gotten this BSOD when I first installed the RAM more then a year ago?
Still not sure what to do.
Thanks
>> How do I find out what I have << note the product code on the ram, and google for it, or check it at www.kingston.com
ASKER
Hello,
I checked the ram last night and they are all CL2.5. I noticed that on my motherboard, it has a chip or something that indicates MSI AGP/8x. Should i look into getting a MSI video board instead of Nvidia or ATI?
Thanks
Danny
I checked the ram last night and they are all CL2.5. I noticed that on my motherboard, it has a chip or something that indicates MSI AGP/8x. Should i look into getting a MSI video board instead of Nvidia or ATI?
Thanks
Danny
you can identify your hardware with Everest : http://www.majorgeeks.com/downloads9.html
ASKER
Hello experts,
Ok, I took out my video card and installed an old one that I had about 3 months ago. It is an NVidia GeForce FX 5200. Today, I opened a project that I have in an application called Proshow that creates DVD out of pictures, anyway, left it running and when I got back, I got the BSOD.
I got the minidump and still can't figure it out. I ran Dr.Watson and this is the output I got. Hope it helps. Any suggestions?
Application exception occurred:
App: C:\WINDOWS\explorer.exe (pid=120044)
When: 1/14/2006 @ 22:02:19.100
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: SKULL
User Name: Danny V
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 6 Model 8 Stepping 1
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: Danny
*----> Task List <----*
0 System Process
4 System
640 smss.exe
712 csrss.exe
740 winlogon.exe
784 services.exe
804 lsass.exe
984 svchost.exe
1068 svchost.exe
1212 svchost.exe
1240 StyleXPService.exe
1372 svchost.exe
1488 SDMCP.exe
1496 svchost.exe
1724 spoolsv.exe
1992 avgamsvr.exe
2028 avgupsvc.exe
2044 avgemc.exe
172 Error 0xD0000022
188 CTsvcCDA.exe
220 nvsvc32.exe
300 ScsiAccess.exe
688 svchost.exe
916 WRSSSDK.exe
1356 avgcc.exe
1364 CTSysVol.exe
1368 CTDVDDET.EXE
1396 CTHELPER.EXE
1416 tfswctrl.exe
1484 gcasServ.exe
1532 RUNDLL32.EXE
1564 SpySweeper.exe
1596 Error 0xD0000022
1616 wdfmgr.exe
1784 Error 0xD0000022
1856 ctfmon.exe
2068 MsPMSPSv.exe
2308 MemTurbo.exe
2348 YahooWidgetEngine.exe
2520 YahooWidgetEngine.exe
2660 gcasDtServ.exe
3088 alg.exe
3732 YahooWidgetEngine.exe
3876 YahooWidgetEngine.exe
3932 YahooWidgetEngine.exe
4052 YahooWidgetEngine.exe
1160 YahooWidgetEngine.exe
1592 YahooWidgetEngine.exe
2120 YahooWidgetEngine.exe
2476 YahooWidgetEngine.exe
1204 svchost.exe
3484 DOpus.exe
67336 MontageProSH.exe
67340 Thumbs.exe
70764 iexplore.exe
117644 launcher.exe
120044 explorer.exe
119036 hpgs2wnf.exe
119460 NOTEPAD.EXE
118820 setup2.0.exe
118272 INS4F.tmp
120456 drwtsn32.exe
*----> Module List <----*
(0000000001000000 - 00000000010ff000: C:\WINDOWS\explorer.exe
(0000000001630000 - 00000000018f6000: C:\WINDOWS\system32\msi.dl l
(0000000001cc0000 - 0000000001cd0000: C:\WINDOWS\system32\ctagen t.dll
(00000000021b0000 - 00000000022b6000: F:\Apps\TrueLaunchBar\tlb. dll
(0000000010000000 - 0000000010016000: C:\PROGRA~1\COMMON~1\stard ock\MCPCor e.dll
(0000000010040000 - 00000000100b5000: F:\Apps\Directory Opus\dopuslib.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2r es.dll
(000000004d4f0000 - 000000004d548000: C:\WINDOWS\system32\WINHTT P.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxThem e.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI 32.dll
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\System32\themeu i.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEn g.dll
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl 32.dll
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui .dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenr al.DLL
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HEL P.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32 .dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\System32\WSOCK3 2.dll
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dl l
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB .dll
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanm an.dll
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP .dll
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1 .dll
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0 .dll
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxpr xy.dll
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF. dll
(0000000074980000 - 0000000074ab0000: C:\WINDOWS\system32\msxml3 .dll
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\System32\POWRPR OF.dll
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\System32\BatMet er.dll
(0000000074b30000 - 0000000074b76000: C:\WINDOWS\System32\webche ck.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTU I.dll
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov .dll
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davcln t.dll
(0000000075f80000 - 000000007607d000: C:\WINDOWS\system32\BROWSE UI.dll
(0000000076280000 - 00000000762a1000: C:\WINDOWS\System32\stobje ct.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA .dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG3 2.dll
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg 32.dll
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHE LL.dll
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL .dll
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKIN FO.dll
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshru i.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USEREN V.dll
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DL L
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM. dll
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui .dll
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRU ST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEH LP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpa pi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutil s.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI 32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP3 2.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCAT Q.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes .dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT 32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININE T.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Micr osoft.Wind ows.Common -Controls_ 6595b64144 ccf1df_6.0 .2600.2180 _x-ww_a84f 1ff9\comct l32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32. dll
(0000000077760000 - 00000000778ce000: C:\WINDOWS\system32\SHDOCV W.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPA PI.dll
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui. dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT3 2.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1 .dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHel p.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM3 2.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSIO N.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt .dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32 .dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI 32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4 .dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32. dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAP I.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\System32\Secur3 2.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel 32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll. dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL3 2.dll
*----> State Dump for Thread Id 0x1d4d4 <----*
eax=00000009 ebx=00000003 ecx=0000012e edx=0000029a esi=00133120 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll. dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SHELL3 2.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\explorer.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel 32.dll -
ChildEBP RetAddr Args to Child
0007ff08 7ca0be38 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 00133120 7ffde000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 0002066e explorer+0x16e95
0007ffc0 7c816d4f 001587e8 0006e890 7ffde000 explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341 kernel32!RegisterWaitForIn putIdle+0x 49
*----> Raw Stack Dump <----*
000000000007fef0 18 94 d4 77 a2 3b a2 7c - ac 92 80 7c 20 31 13 00 ...w.;.|...| 1..
000000000007ff00 20 31 13 00 14 ff 07 00 - 14 ff 07 00 38 be a0 7c 1..........8..|
000000000007ff10 00 00 00 00 5c ff 07 00 - 95 6e 01 01 20 31 13 00 ....\....n.. 1..
000000000007ff20 00 e0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00 ............$...
000000000007ff30 50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c ed aa 80 7c P.......'..|...|
000000000007ff40 ff ff ff ff 0c 00 00 00 - 00 00 00 00 e5 97 32 05 ..............2.
000000000007ff50 a8 00 00 00 01 00 00 00 - 20 31 13 00 c0 ff 07 00 ........ 1......
000000000007ff60 b6 e2 01 01 00 00 00 00 - 00 00 00 00 6e 06 02 00 ............n...
000000000007ff70 05 00 00 00 e8 87 15 00 - 90 e8 06 00 44 00 00 00 ............D...
000000000007ff80 c0 06 02 00 a0 06 02 00 - 70 06 02 00 00 00 00 00 ........p.......
000000000007ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 2e 00 00 00 ................
000000000007ffa0 00 00 00 00 3a ef 06 00 - 01 00 00 00 05 00 00 00 ....:...........
000000000007ffb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000007ffc0 f0 ff 07 00 4f 6d 81 7c - e8 87 15 00 90 e8 06 00 ....Om.|........
000000000007ffd0 00 e0 fd 7f 38 a9 54 80 - c8 ff 07 00 18 b7 af 85 ....8.T.........
000000000007ffe0 ff ff ff ff f3 99 83 7c - 58 6d 81 7c 00 00 00 00 .......|Xm.|....
000000000007fff0 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00 ........N.......
0000000000080000 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Actx ........$..
0000000000080010 c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00 ........ .......
0000000000080020 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00 ............4...
*----> State Dump for Thread Id 0x1d508 <----*
eax=01916d9c ebx=00000000 ecx=01916d9c edx=000a5b7c esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=00e3fe1c ebp=00e3ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4 .dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00e3ff80 77e76c22 00e3ffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
00e3ff88 77e76a3b 000d0dc0 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5 ea
00e3ffa8 77e76c0a 000d0c78 00e3ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4 03
00e3ffb4 7c80b50b 000e0978 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5 d2
00e3ffec 00000000 77e76bf0 000e0978 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000000e3fe1c 99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff e3 00 ...|.g.w....p...
0000000000e3fe2c 00 00 00 00 a0 2f 0e 00 - 4c ff e3 00 04 00 00 00 ...../..L.......
0000000000e3fe3c f8 fd 3f 01 00 00 00 00 - a8 da 38 e2 80 e5 ab 89 ..?.......8.....
0000000000e3fe4c 48 2d da b5 00 00 00 00 - f8 fd 3f 01 00 00 00 00 H-........?.....
0000000000e3fe5c 98 e5 ab 89 80 e5 ab 89 - 48 2d da b5 fd bc 56 80 ........H-....V.
0000000000e3fe6c 64 2d da b5 cc fd 3f 01 - 34 bc 56 80 00 00 00 00 d-....?.4.V.....
0000000000e3fe7c 00 00 00 00 00 00 00 00 - a8 da 38 e2 98 cb 01 00 ..........8.....
0000000000e3fe8c 01 6a 56 80 00 00 00 00 - 20 2c da b5 00 00 00 00 .jV..... ,......
0000000000e3fe9c 00 00 00 00 d8 fd 3f 01 - 9c cb 01 00 00 00 00 00 ......?.........
0000000000e3feac c0 da 38 e2 38 e7 18 e1 - 29 c9 33 e4 b8 2b da b5 ..8.8...).3..+..
0000000000e3febc 07 00 00 00 b8 03 d0 89 - 18 2c da b5 18 00 00 00 .........,......
0000000000e3fecc d0 a5 bd e2 01 fd 3f 01 - 18 00 00 00 d0 a5 bd e2 ......?.........
0000000000e3fedc 01 fd 3f 01 8d 3c 56 80 - f8 2c da b5 00 00 00 00 ..?..<V..,......
0000000000e3feec d8 fd 3f 01 f8 2c da b5 - 18 2c da b5 f8 2c da b5 ..?..,...,...,..
0000000000e3fefc 18 2c da b5 d8 fd 3f 01 - d0 a5 bd e2 b8 a5 bd e2 .,....?.........
0000000000e3ff0c d8 a2 ad 85 14 2c da b5 - 54 8a ad 85 24 2c da b5 .....,..T...$,..
0000000000e3ff1c b2 c2 4d 80 ba c2 4d 80 - 24 8a ad 85 b8 88 ad 85 ..M...M.$.......
0000000000e3ff2c ec 88 ad 85 80 ff e3 00 - 99 66 e7 77 4c ff e3 00 .........f.wL...
0000000000e3ff3c a9 66 e7 77 ed 10 90 7c - 00 f7 0d 00 78 09 0e 00 .f.w...|....x...
0000000000e3ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0x1d50c <----*
eax=774fe429 ebx=00007530 ecx=7ffde000 edx=00000000 esi=000001c0 edi=00000000
eip=7c90eb94 esp=00e8ff28 ebp=00e8ff8c iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ole32. dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00e8ff8c 774fe407 000001c0 00007530 00000000 ntdll!KiFastSystemCallRet
00e8ffb4 7c80b50b 000e30d0 7c910945 7c91094e ole32!StringFromGUID2+0x60 5
00e8ffec 00000000 774fe429 000e30d0 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000000e8ff28 c0 e9 90 7c db 25 80 7c - c0 01 00 00 00 00 00 00 ...|.%.|........
0000000000e8ff38 5c ff e8 00 50 25 80 7c - d0 30 0e 00 30 75 00 00 \...P%.|.0..0u..
0000000000e8ff48 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e8ff58 10 00 00 00 00 5d 1e ee - ff ff ff ff 00 e0 fd 7f .....]..........
0000000000e8ff68 00 b0 fd 7f 5c ff e8 00 - 58 24 80 7c 3c ff e8 00 ....\...X$.|<...
0000000000e8ff78 0f 24 80 7c dc ff e8 00 - f3 99 83 7c 08 26 80 7c .$.|.......|.&.|
0000000000e8ff88 00 00 00 00 b4 ff e8 00 - 07 e4 4f 77 c0 01 00 00 ..........Ow....
0000000000e8ff98 30 75 00 00 00 00 00 00 - 45 09 91 7c d0 30 0e 00 0u......E..|.0..
0000000000e8ffa8 00 00 4e 77 44 e4 4f 77 - 4e 09 91 7c ec ff e8 00 ..NwD.OwN..|....
0000000000e8ffb8 0b b5 80 7c d0 30 0e 00 - 45 09 91 7c 4e 09 91 7c ...|.0..E..|N..|
0000000000e8ffc8 d0 30 0e 00 00 b0 fd 7f - 00 26 eb 89 c0 ff e8 00 .0.......&......
0000000000e8ffd8 10 55 0d 88 ff ff ff ff - f3 99 83 7c 18 b5 80 7c .U.........|...|
0000000000e8ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 29 e4 4f 77 ............).Ow
0000000000e8fff8 d0 30 0e 00 00 00 00 00 - 00 00 00 00 00 00 00 00 .0..............
0000000000e90008 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e90018 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e90028 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e90038 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e90048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e90058 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x1d510 <----*
eax=022ddfa8 ebx=0000001c ecx=0000c055 edx=7c90eb94 esi=022ddfa8 edi=000905dc
eip=021f6eb2 esp=00ecfd60 ebp=0001caa8 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** WARNING: Unable to verify checksum for F:\Apps\TrueLaunchBar\tlb. dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\Apps\TrueLaunchBar\tlb. dll -
function: tlb
021f6e97 6c insb
021f6e98 2428 and al,0x28
021f6e9a 8b5c2420 mov ebx,[esp+0x20]
021f6e9e 7419 jz tlb+0x46eb9 (021f6eb9)
021f6ea0 68a0832502 push 0x22583a0
021f6ea5 57 push edi
021f6ea6 ff15f4262702 call dword ptr [tlb+0xc26f4 (022726f4)]
021f6eac 8bf0 mov esi,eax
021f6eae 85f6 test esi,esi
021f6eb0 7407 jz tlb+0x46eb9 (021f6eb9)
FAULT ->021f6eb2 397e10 cmp [esi+0x10],edi ds:0023:022ddfb8=????????
021f6eb5 7407 jz tlb+0x46ebe (021f6ebe)
021f6eb7 33f6 xor esi,esi
021f6eb9 83fb01 cmp ebx,0x1
021f6ebc 754a jnz tlb+0x46f08 (021f6f08)
021f6ebe 81fb13010000 cmp ebx,0x113
021f6ec4 0f87b3000000 jnbe tlb+0x46f7d (021f6f7d)
021f6eca 0f8495000000 je tlb+0x46f65 (021f6f65)
021f6ed0 8d43ff lea eax,[ebx-0x1]
021f6ed3 83f820 cmp eax,0x20
021f6ed6 7730 ja tlb+0x46f08 (021f6f08)
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0001caa8 00000000 00000000 00000000 00000000 tlb+0x46eb2
*----> Raw Stack Dump <----*
0000000000ecfd60 dc fd ec 00 80 6e 1f 02 - a0 fd ec 00 00 00 00 00 .....n..........
0000000000ecfd70 83 d1 00 00 a0 fd ec 00 - 34 87 d4 77 dc 05 09 00 ........4..w....
0000000000ecfd80 1c 00 00 00 00 00 00 00 - a8 ca 01 00 80 6e 1f 02 .............n..
0000000000ecfd90 cd ab ba dc 00 00 00 00 - dc fd ec 00 80 6e 1f 02 .............n..
0000000000ecfda0 08 fe ec 00 16 88 d4 77 - 80 6e 1f 02 dc 05 09 00 .......w.n......
0000000000ecfdb0 1c 00 00 00 00 00 00 00 - a8 ca 01 00 28 2e 0f 00 ............(...
0000000000ecfdc0 dc 05 09 00 02 01 00 00 - 14 00 00 00 01 00 00 00 ................
0000000000ecfdd0 00 00 00 00 28 2e 0f 00 - 00 00 00 00 00 00 00 00 ....(...........
0000000000ecfde0 ff ff ff ff 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ecfdf0 bc fd ec 00 84 f9 ec 00 - 4c fe ec 00 67 04 d7 77 ........L...g..w
0000000000ecfe00 30 88 d4 77 00 00 00 00 - 5c fe ec 00 c0 b4 d4 77 0..w....\......w
0000000000ecfe10 28 2e 0f 00 80 6e 1f 02 - dc 05 09 00 1c 00 00 00 (....n..........
0000000000ecfe20 00 00 00 00 a8 ca 01 00 - cc ee 62 00 01 00 00 00 ..........b.....
0000000000ecfe30 00 00 00 00 28 ff ec 00 - 02 01 00 00 d9 8b d4 77 ....(..........w
0000000000ecfe40 00 00 00 00 30 fe ec 00 - 84 f9 ec 00 dc ff ec 00 ....0...........
0000000000ecfe50 67 04 d7 77 d0 b4 d4 77 - ff ff ff ff 84 fe ec 00 g..w...w........
0000000000ecfe60 0c b5 d4 77 b8 ee 62 00 - 1c 00 00 00 00 00 00 00 ...w..b.........
0000000000ecfe70 a8 ca 01 00 80 6e 1f 02 - 00 00 00 00 00 00 00 00 .....n..........
0000000000ecfe80 00 00 00 00 d4 fe ec 00 - e3 ea 90 7c 94 fe ec 00 ...........|....
0000000000ecfe90 18 00 00 00 b8 ee 62 00 - 1c 00 00 00 00 00 00 00 ......b.........
*----> State Dump for Thread Id 0x1d514 <----*
eax=7c92798d ebx=00000000 ecx=77dd6a51 edx=77dd6a18 esi=ffffffff edi=7c90fb78
eip=7c90eb94 esp=00f0ff9c ebp=00f0ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00f0ffb4 7c80b50b 00000000 7c90fb78 ffffffff ntdll!KiFastSystemCallRet
00f0ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000000f0ff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff f0 00 \..|.y.|........
0000000000f0ffac 00 00 00 00 00 00 00 80 - ec ff f0 00 0b b5 80 7c ...............|
0000000000f0ffbc 00 00 00 00 78 fb 90 7c - ff ff ff ff 00 00 00 00 ....x..|........
0000000000f0ffcc 00 90 fd 7f 00 26 eb 89 - c0 ff f0 00 78 fb e4 87 .....&......x...
0000000000f0ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
0000000000f0ffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
0000000000f0fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f100ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f100bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f100cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x1d518 <----*
eax=000d9b48 ebx=00000000 ecx=64710003 edx=64700002 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=00f4ff70 ebp=00f4ffb4 iopl=0 nv up ei ng nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00f4ffb4 7c80b50b 00000000 00ecfce4 00ecfce8 ntdll!KiFastSystemCallRet
00f4ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000000f4ff70 1b e3 90 7c 9d 07 91 7c - ec 01 00 00 ac ff f4 00 ...|...|........
0000000000f4ff80 b0 ff f4 00 98 ff f4 00 - a0 ff f4 00 e4 fc ec 00 ................
0000000000f4ff90 e8 fc ec 00 00 00 00 00 - 00 00 00 00 b0 c0 92 01 ................
0000000000f4ffa0 00 7c 28 e8 ff ff ff ff - 35 5c 70 80 69 75 92 7c .|(.....5\p.iu.|
0000000000f4ffb0 70 39 13 00 ec ff f4 00 - 0b b5 80 7c 00 00 00 00 p9.........|....
0000000000f4ffc0 e4 fc ec 00 e8 fc ec 00 - 00 00 00 00 00 80 fd 7f ................
0000000000f4ffd0 00 26 eb 89 c0 ff f4 00 - 78 fb e4 87 ff ff ff ff .&......x.......
0000000000f4ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000000f4fff0 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 ....`..|........
0000000000f50000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50090 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f500a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x1d51c <----*
eax=000000c0 ebx=00000000 ecx=00ecfb00 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=00f8fcec ebp=00f8ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00f8ffb4 7c80b50b 00000000 00000020 00ecfce4 ntdll!KiFastSystemCallRet
00f8ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000000f8fcec ab e9 90 7c d5 a0 92 7c - 03 00 00 00 30 fd f8 00 ...|...|....0...
0000000000f8fcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00 ............ ...
0000000000f8fd0c e4 fc ec 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c ...........|...|
0000000000f8fd1c f4 01 00 00 1c d5 01 00 - 03 00 00 00 03 00 00 00 ................
0000000000f8fd2c 02 00 00 00 f0 01 00 00 - d8 01 00 00 b0 04 00 00 ................
0000000000f8fd3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x1d524 <----*
eax=00fe0010 ebx=001077d0 ecx=00001000 edx=7c90eb94 esi=00000000 edi=7ffde000
eip=7c90eb94 esp=015efd30 ebp=015efdcc iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32 .dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
015efdcc 77d495f9 00000009 015efdf4 00000000 ntdll!KiFastSystemCallRet
015efe28 7c9f4e37 00000008 015efe50 ffffffff USER32!GetLastInputInfo+0x 105
015eff4c 7ca0a334 77f74292 00000000 7c809988 SHELL32!Ordinal646+0x21e2
015effb4 7c80b50b 00000000 7c809988 00090000 SHELL32!Ordinal753+0x133
015effec 00000000 77f74223 00ecf4d4 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
00000000015efd30 ab e9 90 7c f2 94 80 7c - 09 00 00 00 d0 77 10 00 ...|...|.....w..
00000000015efd40 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000015efd50 09 00 00 00 02 00 00 00 - 18 bd 5a 00 14 00 00 00 ..........Z.....
00000000015efd60 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
00000000015efd70 00 00 00 00 30 00 00 00 - 14 00 00 00 01 00 00 00 ....0...........
00000000015efd80 60 d1 0e 00 00 00 00 00 - 00 00 00 00 ec fd 5e 01 `.............^.
00000000015efd90 67 04 d7 77 30 88 d4 77 - 00 e0 fd 7f 00 60 fd 7f g..w0..w.....`..
00000000015efda0 00 60 fd 7f 00 00 00 00 - d0 77 10 00 e2 00 06 00 .`.......w......
00000000015efdb0 09 00 00 00 4c fd 5e 01 - 00 00 00 00 dc ff 5e 01 ....L.^.......^.
00000000015efdc0 f3 99 83 7c 90 95 80 7c - 00 00 00 00 28 fe 5e 01 ...|...|....(.^.
00000000015efdd0 f9 95 d4 77 09 00 00 00 - f4 fd 5e 01 00 00 00 00 ...w......^.....
00000000015efde0 ff ff ff ff 01 00 00 00 - 80 b5 11 00 08 00 00 00 ................
00000000015efdf0 00 00 00 00 bc 04 00 00 - 5c 04 00 00 0c 03 00 00 ........\.......
00000000015efe00 e0 02 00 00 e4 02 00 00 - 38 02 00 00 40 02 00 00 ........8...@...
00000000015efe10 44 02 00 00 14 02 00 00 - 00 00 00 00 01 00 00 00 D...............
00000000015efe20 00 60 fd 7f 14 02 00 00 - 4c ff 5e 01 37 4e 9f 7c .`......L.^.7N.|
00000000015efe30 08 00 00 00 50 fe 5e 01 - ff ff ff ff ff 04 00 00 ....P.^.........
00000000015efe40 f4 fd 5e 01 00 00 00 00 - 00 00 00 00 00 00 00 00 ..^.............
00000000015efe50 bc 04 00 00 5c 04 00 00 - 0c 03 00 00 e0 02 00 00 ....\...........
00000000015efe60 e4 02 00 00 38 02 00 00 - 40 02 00 00 44 02 00 00 ....8...@...D...
*----> State Dump for Thread Id 0x1d580 <----*
eax=7751a2bf ebx=00000000 ecx=00000000 edx=00000008 esi=01b8ff98 edi=00000000
eip=7c90eb94 esp=01b8ff58 ebp=01b8ff74 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\NETSHE LL.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01b8ff74 764434cb 01b8ff98 00000000 00000000 ntdll!KiFastSystemCallRet
01b8ffb4 7c80b50b 76476328 00000000 7c900000 NETSHELL!NetSetupSetProgre ssCallback +0x19160
01b8ffec 00000000 7644348c 76476328 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000001b8ff58 be 91 d4 77 f1 91 d4 77 - 98 ff b8 01 00 00 00 00 ...w...w........
0000000001b8ff68 00 00 00 00 00 00 00 00 - c6 91 d4 77 b4 ff b8 01 ...........w....
0000000001b8ff78 cb 34 44 76 98 ff b8 01 - 00 00 00 00 00 00 00 00 .4Dv............
0000000001b8ff88 00 00 00 00 00 00 90 7c - 00 00 00 00 28 63 47 76 .......|....(cGv
0000000001b8ff98 00 00 00 00 00 00 00 00 - 81 a8 4f 80 9c 4c 50 b8 ..........O..LP.
0000000001b8ffa8 35 5c 70 80 00 00 00 00 - dc e2 90 7c ec ff b8 01 5\p........|....
0000000001b8ffb8 0b b5 80 7c 28 63 47 76 - 00 00 00 00 00 00 90 7c ...|(cGv.......|
0000000001b8ffc8 28 63 47 76 00 d0 fa 7f - 00 26 eb 89 c0 ff b8 01 (cGv.....&......
0000000001b8ffd8 a8 fe d5 89 ff ff ff ff - f3 99 83 7c 18 b5 80 7c ...........|...|
0000000001b8ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 8c 34 44 76 .............4Dv
0000000001b8fff8 28 63 47 76 00 00 00 00 - c8 00 00 00 6b 01 00 00 (cGv........k...
0000000001b90008 ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00 ................
0000000001b90018 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... ..
0000000001b90028 e8 01 00 00 ff ef fd 7f - 0c 00 08 06 00 00 00 00 ................
0000000001b90038 00 00 00 00 00 00 00 00 - 00 00 00 00 98 05 b9 01 ................
0000000001b90048 0f 00 00 00 f8 ff ff ff - 50 00 b9 01 50 00 b9 01 ........P...P...
0000000001b90058 40 06 b9 01 00 00 00 00 - 00 00 00 00 00 00 00 00 @...............
0000000001b90068 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001b90078 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001b90088 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x1d590 <----*
eax=77e76bf0 ebx=00000000 ecx=0000000c edx=003c3750 esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=01cafe1c ebp=01caff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01caff80 77e76c22 01caffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
01caff88 77e76a3b 000d0dc0 00000000 003c0178 RPCRT4!I_RpcBCacheFree+0x5 ea
01caffa8 77e76c0a 000d0c78 01caffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4 03
01caffb4 7c80b50b 0190e658 00000000 003c0178 RPCRT4!I_RpcBCacheFree+0x5 d2
01caffec 00000000 77e76bf0 0190e658 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000001cafe1c 99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff ca 01 ...|.g.w....p...
0000000001cafe2c 00 00 00 00 10 5a 90 01 - 4c ff ca 01 00 00 00 00 .....Z..L.......
0000000001cafe3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cafe4c 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cafe5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cafe6c ea 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cafe7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cafe8c 00 00 00 00 00 00 00 00 - d4 3b eb b5 40 19 56 80 .........;..@.V.
0000000001cafe9c e1 a9 54 80 00 00 00 00 - f8 e9 c7 89 80 d8 c7 89 ..T.............
0000000001cafeac 00 00 00 00 00 00 00 00 - 00 00 00 00 e4 93 49 f7 ..............I.
0000000001cafebc 18 1e e3 89 02 00 00 00 - a8 1d e3 89 a8 1d e3 89 ................
0000000001cafecc c0 3b eb b5 1f 41 4e 80 - c8 e9 bb 89 98 ed 3e 88 .;...AN.......>.
0000000001cafedc 06 02 00 00 9d b7 4d 80 - 02 00 00 00 52 41 4e 80 ......M.....RAN.
0000000001cafeec 98 ed 3e 88 00 00 00 00 - f4 3b eb b5 5b 89 4a f7 ..>......;..[.J.
0000000001cafefc dc 93 49 f7 a0 ed 3e 88 - f8 e9 c7 89 80 d8 c7 89 ..I...>.........
0000000001caff0c 78 5a 97 b9 7a 89 4a f7 - bc 31 b7 85 24 3c eb b5 xZ..z.J..1..$<..
0000000001caff1c b2 c2 4d 80 ba c2 4d 80 - 8c 31 b7 85 20 30 b7 85 ..M...M..1.. 0..
0000000001caff2c 54 30 b7 85 80 ff ca 01 - 99 66 e7 77 4c ff ca 01 T0.......f.wL...
0000000001caff3c a9 66 e7 77 ed 10 90 7c - f0 23 90 01 58 e6 90 01 .f.w...|.#..X...
0000000001caff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0x1d634 <----*
eax=77e76bf0 ebx=00000000 ecx=00090178 edx=00090000 esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=01e3fe1c ebp=01e3ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01e3ff80 77e76c22 01e3ffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
01e3ff88 77e76a3b 000d0dc0 01b931e8 00000018 RPCRT4!I_RpcBCacheFree+0x5 ea
01e3ffa8 77e76c0a 000d0c78 01e3ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4 03
01e3ffb4 7c80b50b 001313c8 01b931e8 00000018 RPCRT4!I_RpcBCacheFree+0x5 d2
01e3ffec 00000000 77e76bf0 001313c8 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000001e3fe1c 99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff e3 01 ...|.g.w....p...
0000000001e3fe2c 00 00 00 00 c8 00 92 01 - 54 ff e3 01 00 00 00 00 ........T.......
0000000001e3fe3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3feac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3febc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fecc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fedc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3feec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fefc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 01 ................
0000000001e3ff0c 00 00 00 01 00 00 00 01 - bc 51 b0 85 24 dc ff b7 .........Q..$...
0000000001e3ff1c b2 c2 4d 80 ba c2 4d 80 - 8c 51 b0 85 20 50 b0 85 ..M...M..Q.. P..
0000000001e3ff2c 54 50 b0 85 80 ff e3 01 - 99 66 e7 77 4c ff e3 01 TP.......f.wL...
0000000001e3ff3c a9 66 e7 77 ed 10 90 7c - f0 04 13 00 c8 13 13 00 .f.w...|........
0000000001e3ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0x1d684 <----*
eax=00000004 ebx=000003b8 ecx=002826a0 edx=7f6f0801 esi=0000004a edi=01f6f45c
eip=7c90eb94 esp=01f6f3b8 ebp=01f6f3f4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\System32\stobje ct.dll -
ChildEBP RetAddr Args to Child
01f6f3f4 77d4e4ab 00020078 0000004a 00120520 ntdll!KiFastSystemCallRet
01f6f41c 7ca21c37 00020078 0000004a 00120520 USER32!SendMessageTimeoutW +0x21
01f6f828 7645476d 00000001 01f6f83c 01f6fc84 SHELL32!Shell_NotifyIconW+ 0x12d
01f6fbf8 76454c4a 00000000 000000be 01f6fc1c NETSHELL!NetSetupSetProgre ssCallback +0x2a402
01f6fc08 7640f555 00120520 00000000 000000be NETSHELL!NetSetupSetProgre ssCallback +0x2a8df
01f6fc1c 77d48734 00120520 00000405 00000000 NETSHELL!NormalizeExtended Status+0x3 bb6
01f6fc48 77d48816 76401b9f 00120520 00000405 USER32!GetDC+0x6d
01f6fcb0 77d489cd 00136120 76401b9f 00120520 USER32!GetDC+0x14f
01f6fd10 77d48a10 01f6fd68 00000000 01f6fd8c USER32!GetWindowLongW+0x12 7
01f6fd20 7628155a 01f6fd68 00000000 76280000 USER32!DispatchMessageW+0x f
01f6fd8c 76283746 76280000 00000000 00040338 stobject+0x155a
01f6ffb4 7c80b50b 00000000 00000000 00000000 stobject!DllCanUnloadNow+0 x1fa4
01f6ffec 00000000 762836f7 00000000 00000000 kernel32!GetModuleFileName A+0x1b4
*----> Raw Stack Dump <----*
0000000001f6f3b8 be 94 d4 77 73 e4 d4 77 - 78 00 02 00 4a 00 00 00 ...ws..wx...J...
0000000001f6f3c8 20 05 12 00 48 f4 f6 01 - e4 f3 f6 01 b2 02 00 00 ...H...........
0000000001f6f3d8 00 00 00 00 f4 fb f6 01 - 01 00 00 00 03 00 00 00 ................
0000000001f6f3e8 a0 0f 00 00 00 00 00 00 - 00 00 00 00 1c f4 f6 01 ................
0000000001f6f3f8 ab e4 d4 77 78 00 02 00 - 4a 00 00 00 20 05 12 00 ...wx...J... ...
0000000001f6f408 48 f4 f6 01 03 00 00 00 - a0 0f 00 00 5c f4 f6 01 H...........\...
0000000001f6f418 00 00 00 00 28 f8 f6 01 - 37 1c a2 7c 78 00 02 00 ....(...7..|x...
0000000001f6f428 4a 00 00 00 20 05 12 00 - 48 f4 f6 01 03 00 00 00 J... ...H.......
0000000001f6f438 a0 0f 00 00 5c f4 f6 01 - 9f 1b 40 76 00 00 00 00 ....\.....@v....
0000000001f6f448 01 00 00 00 c0 03 00 00 - 64 f4 f6 01 3c f8 f6 01 ........d...<...
0000000001f6f458 78 00 02 00 00 00 00 00 - 3f 00 00 00 23 34 75 34 x.......?...#4u4
0000000001f6f468 01 00 00 00 b8 03 00 00 - 20 05 12 00 00 00 00 00 ........ .......
0000000001f6f478 0a 00 00 00 00 00 00 00 - 3d 07 6a 00 00 00 00 00 ........=.j.....
0000000001f6f488 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f498 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f4a8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f4b8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f4c8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f4d8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f4e8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
Ok, I took out my video card and installed an old one that I had about 3 months ago. It is an NVidia GeForce FX 5200. Today, I opened a project that I have in an application called Proshow that creates DVD out of pictures, anyway, left it running and when I got back, I got the BSOD.
I got the minidump and still can't figure it out. I ran Dr.Watson and this is the output I got. Hope it helps. Any suggestions?
Application exception occurred:
App: C:\WINDOWS\explorer.exe (pid=120044)
When: 1/14/2006 @ 22:02:19.100
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: SKULL
User Name: Danny V
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 6 Model 8 Stepping 1
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: Danny
*----> Task List <----*
0 System Process
4 System
640 smss.exe
712 csrss.exe
740 winlogon.exe
784 services.exe
804 lsass.exe
984 svchost.exe
1068 svchost.exe
1212 svchost.exe
1240 StyleXPService.exe
1372 svchost.exe
1488 SDMCP.exe
1496 svchost.exe
1724 spoolsv.exe
1992 avgamsvr.exe
2028 avgupsvc.exe
2044 avgemc.exe
172 Error 0xD0000022
188 CTsvcCDA.exe
220 nvsvc32.exe
300 ScsiAccess.exe
688 svchost.exe
916 WRSSSDK.exe
1356 avgcc.exe
1364 CTSysVol.exe
1368 CTDVDDET.EXE
1396 CTHELPER.EXE
1416 tfswctrl.exe
1484 gcasServ.exe
1532 RUNDLL32.EXE
1564 SpySweeper.exe
1596 Error 0xD0000022
1616 wdfmgr.exe
1784 Error 0xD0000022
1856 ctfmon.exe
2068 MsPMSPSv.exe
2308 MemTurbo.exe
2348 YahooWidgetEngine.exe
2520 YahooWidgetEngine.exe
2660 gcasDtServ.exe
3088 alg.exe
3732 YahooWidgetEngine.exe
3876 YahooWidgetEngine.exe
3932 YahooWidgetEngine.exe
4052 YahooWidgetEngine.exe
1160 YahooWidgetEngine.exe
1592 YahooWidgetEngine.exe
2120 YahooWidgetEngine.exe
2476 YahooWidgetEngine.exe
1204 svchost.exe
3484 DOpus.exe
67336 MontageProSH.exe
67340 Thumbs.exe
70764 iexplore.exe
117644 launcher.exe
120044 explorer.exe
119036 hpgs2wnf.exe
119460 NOTEPAD.EXE
118820 setup2.0.exe
118272 INS4F.tmp
120456 drwtsn32.exe
*----> Module List <----*
(0000000001000000 - 00000000010ff000: C:\WINDOWS\explorer.exe
(0000000001630000 - 00000000018f6000: C:\WINDOWS\system32\msi.dl
(0000000001cc0000 - 0000000001cd0000: C:\WINDOWS\system32\ctagen
(00000000021b0000 - 00000000022b6000: F:\Apps\TrueLaunchBar\tlb.
(0000000010000000 - 0000000010016000: C:\PROGRA~1\COMMON~1\stard
(0000000010040000 - 00000000100b5000: F:\Apps\Directory Opus\dopuslib.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2r
(000000004d4f0000 - 000000004d548000: C:\WINDOWS\system32\WINHTT
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxThem
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI
(000000005ba60000 - 000000005bad1000: C:\WINDOWS\System32\themeu
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEn
(000000005d090000 - 000000005d127000: C:\WINDOWS\system32\comctl
(00000000605d0000 - 00000000605d9000: C:\WINDOWS\system32\mslbui
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenr
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HEL
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\System32\WSOCK3
(0000000071b20000 - 0000000071b32000: C:\WINDOWS\system32\MPR.dl
(0000000071bf0000 - 0000000071c03000: C:\WINDOWS\system32\SAMLIB
(0000000071c10000 - 0000000071c1e000: C:\WINDOWS\System32\ntlanm
(0000000071c80000 - 0000000071c87000: C:\WINDOWS\System32\NETRAP
(0000000071c90000 - 0000000071cd0000: C:\WINDOWS\System32\NETUI1
(0000000071cd0000 - 0000000071ce7000: C:\WINDOWS\System32\NETUI0
(0000000071d40000 - 0000000071d5c000: C:\WINDOWS\System32\actxpr
(0000000074720000 - 000000007476b000: C:\WINDOWS\system32\MSCTF.
(0000000074980000 - 0000000074ab0000: C:\WINDOWS\system32\msxml3
(0000000074ad0000 - 0000000074ad8000: C:\WINDOWS\System32\POWRPR
(0000000074af0000 - 0000000074afa000: C:\WINDOWS\System32\BatMet
(0000000074b30000 - 0000000074b76000: C:\WINDOWS\System32\webche
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTU
(0000000075f60000 - 0000000075f67000: C:\WINDOWS\System32\drprov
(0000000075f70000 - 0000000075f79000: C:\WINDOWS\System32\davcln
(0000000075f80000 - 000000007607d000: C:\WINDOWS\system32\BROWSE
(0000000076280000 - 00000000762a1000: C:\WINDOWS\System32\stobje
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA
(0000000076380000 - 0000000076385000: C:\WINDOWS\System32\MSIMG3
(00000000763b0000 - 00000000763f9000: C:\WINDOWS\system32\comdlg
(0000000076400000 - 00000000765a6000: C:\WINDOWS\system32\NETSHE
(0000000076600000 - 000000007661d000: C:\WINDOWS\System32\CSCDLL
(0000000076980000 - 0000000076988000: C:\WINDOWS\system32\LINKIN
(0000000076990000 - 00000000769b5000: C:\WINDOWS\system32\ntshru
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USEREN
(0000000076b20000 - 0000000076b31000: C:\WINDOWS\system32\ATL.DL
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.
(0000000076c00000 - 0000000076c2e000: C:\WINDOWS\system32\credui
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRU
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEH
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpa
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutil
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\System32\WTSAPI
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP3
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCAT
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININE
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Micr
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.
(0000000077760000 - 00000000778ce000: C:\WINDOWS\system32\SHDOCV
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPA
(0000000077a20000 - 0000000077a74000: C:\WINDOWS\System32\cscui.
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT3
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHel
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM3
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSIO
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAP
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\System32\Secur3
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL3
*----> State Dump for Thread Id 0x1d4d4 <----*
eax=00000009 ebx=00000003 ecx=0000012e edx=0000029a esi=00133120 edi=00000000
eip=7c90eb94 esp=0007fef0 ebp=0007ff08 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SHELL3
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\explorer.exe
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel
ChildEBP RetAddr Args to Child
0007ff08 7ca0be38 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet
0007ff14 01016e95 00133120 7ffde000 0007ffc0 SHELL32!Ordinal201+0x28
0007ff5c 0101e2b6 00000000 00000000 0002066e explorer+0x16e95
0007ffc0 7c816d4f 001587e8 0006e890 7ffde000 explorer+0x1e2b6
0007fff0 00000000 0101e24e 00000000 78746341 kernel32!RegisterWaitForIn
*----> Raw Stack Dump <----*
000000000007fef0 18 94 d4 77 a2 3b a2 7c - ac 92 80 7c 20 31 13 00 ...w.;.|...| 1..
000000000007ff00 20 31 13 00 14 ff 07 00 - 14 ff 07 00 38 be a0 7c 1..........8..|
000000000007ff10 00 00 00 00 5c ff 07 00 - 95 6e 01 01 20 31 13 00 ....\....n.. 1..
000000000007ff20 00 e0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00 ............$...
000000000007ff30 50 ff 07 00 e0 ff 07 00 - 27 e0 90 7c ed aa 80 7c P.......'..|...|
000000000007ff40 ff ff ff ff 0c 00 00 00 - 00 00 00 00 e5 97 32 05 ..............2.
000000000007ff50 a8 00 00 00 01 00 00 00 - 20 31 13 00 c0 ff 07 00 ........ 1......
000000000007ff60 b6 e2 01 01 00 00 00 00 - 00 00 00 00 6e 06 02 00 ............n...
000000000007ff70 05 00 00 00 e8 87 15 00 - 90 e8 06 00 44 00 00 00 ............D...
000000000007ff80 c0 06 02 00 a0 06 02 00 - 70 06 02 00 00 00 00 00 ........p.......
000000000007ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 2e 00 00 00 ................
000000000007ffa0 00 00 00 00 3a ef 06 00 - 01 00 00 00 05 00 00 00 ....:...........
000000000007ffb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000007ffc0 f0 ff 07 00 4f 6d 81 7c - e8 87 15 00 90 e8 06 00 ....Om.|........
000000000007ffd0 00 e0 fd 7f 38 a9 54 80 - c8 ff 07 00 18 b7 af 85 ....8.T.........
000000000007ffe0 ff ff ff ff f3 99 83 7c - 58 6d 81 7c 00 00 00 00 .......|Xm.|....
000000000007fff0 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00 ........N.......
0000000000080000 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Actx ........$..
0000000000080010 c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00 ........ .......
0000000000080020 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00 ............4...
*----> State Dump for Thread Id 0x1d508 <----*
eax=01916d9c ebx=00000000 ecx=01916d9c edx=000a5b7c esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=00e3fe1c ebp=00e3ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00e3ff80 77e76c22 00e3ffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
00e3ff88 77e76a3b 000d0dc0 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5
00e3ffa8 77e76c0a 000d0c78 00e3ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4
00e3ffb4 7c80b50b 000e0978 00000000 0007f88c RPCRT4!I_RpcBCacheFree+0x5
00e3ffec 00000000 77e76bf0 000e0978 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000000e3fe1c 99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff e3 00 ...|.g.w....p...
0000000000e3fe2c 00 00 00 00 a0 2f 0e 00 - 4c ff e3 00 04 00 00 00 ...../..L.......
0000000000e3fe3c f8 fd 3f 01 00 00 00 00 - a8 da 38 e2 80 e5 ab 89 ..?.......8.....
0000000000e3fe4c 48 2d da b5 00 00 00 00 - f8 fd 3f 01 00 00 00 00 H-........?.....
0000000000e3fe5c 98 e5 ab 89 80 e5 ab 89 - 48 2d da b5 fd bc 56 80 ........H-....V.
0000000000e3fe6c 64 2d da b5 cc fd 3f 01 - 34 bc 56 80 00 00 00 00 d-....?.4.V.....
0000000000e3fe7c 00 00 00 00 00 00 00 00 - a8 da 38 e2 98 cb 01 00 ..........8.....
0000000000e3fe8c 01 6a 56 80 00 00 00 00 - 20 2c da b5 00 00 00 00 .jV..... ,......
0000000000e3fe9c 00 00 00 00 d8 fd 3f 01 - 9c cb 01 00 00 00 00 00 ......?.........
0000000000e3feac c0 da 38 e2 38 e7 18 e1 - 29 c9 33 e4 b8 2b da b5 ..8.8...).3..+..
0000000000e3febc 07 00 00 00 b8 03 d0 89 - 18 2c da b5 18 00 00 00 .........,......
0000000000e3fecc d0 a5 bd e2 01 fd 3f 01 - 18 00 00 00 d0 a5 bd e2 ......?.........
0000000000e3fedc 01 fd 3f 01 8d 3c 56 80 - f8 2c da b5 00 00 00 00 ..?..<V..,......
0000000000e3feec d8 fd 3f 01 f8 2c da b5 - 18 2c da b5 f8 2c da b5 ..?..,...,...,..
0000000000e3fefc 18 2c da b5 d8 fd 3f 01 - d0 a5 bd e2 b8 a5 bd e2 .,....?.........
0000000000e3ff0c d8 a2 ad 85 14 2c da b5 - 54 8a ad 85 24 2c da b5 .....,..T...$,..
0000000000e3ff1c b2 c2 4d 80 ba c2 4d 80 - 24 8a ad 85 b8 88 ad 85 ..M...M.$.......
0000000000e3ff2c ec 88 ad 85 80 ff e3 00 - 99 66 e7 77 4c ff e3 00 .........f.wL...
0000000000e3ff3c a9 66 e7 77 ed 10 90 7c - 00 f7 0d 00 78 09 0e 00 .f.w...|....x...
0000000000e3ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0x1d50c <----*
eax=774fe429 ebx=00007530 ecx=7ffde000 edx=00000000 esi=000001c0 edi=00000000
eip=7c90eb94 esp=00e8ff28 ebp=00e8ff8c iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ole32.
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00e8ff8c 774fe407 000001c0 00007530 00000000 ntdll!KiFastSystemCallRet
00e8ffb4 7c80b50b 000e30d0 7c910945 7c91094e ole32!StringFromGUID2+0x60
00e8ffec 00000000 774fe429 000e30d0 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000000e8ff28 c0 e9 90 7c db 25 80 7c - c0 01 00 00 00 00 00 00 ...|.%.|........
0000000000e8ff38 5c ff e8 00 50 25 80 7c - d0 30 0e 00 30 75 00 00 \...P%.|.0..0u..
0000000000e8ff48 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e8ff58 10 00 00 00 00 5d 1e ee - ff ff ff ff 00 e0 fd 7f .....]..........
0000000000e8ff68 00 b0 fd 7f 5c ff e8 00 - 58 24 80 7c 3c ff e8 00 ....\...X$.|<...
0000000000e8ff78 0f 24 80 7c dc ff e8 00 - f3 99 83 7c 08 26 80 7c .$.|.......|.&.|
0000000000e8ff88 00 00 00 00 b4 ff e8 00 - 07 e4 4f 77 c0 01 00 00 ..........Ow....
0000000000e8ff98 30 75 00 00 00 00 00 00 - 45 09 91 7c d0 30 0e 00 0u......E..|.0..
0000000000e8ffa8 00 00 4e 77 44 e4 4f 77 - 4e 09 91 7c ec ff e8 00 ..NwD.OwN..|....
0000000000e8ffb8 0b b5 80 7c d0 30 0e 00 - 45 09 91 7c 4e 09 91 7c ...|.0..E..|N..|
0000000000e8ffc8 d0 30 0e 00 00 b0 fd 7f - 00 26 eb 89 c0 ff e8 00 .0.......&......
0000000000e8ffd8 10 55 0d 88 ff ff ff ff - f3 99 83 7c 18 b5 80 7c .U.........|...|
0000000000e8ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 29 e4 4f 77 ............).Ow
0000000000e8fff8 d0 30 0e 00 00 00 00 00 - 00 00 00 00 00 00 00 00 .0..............
0000000000e90008 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e90018 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e90028 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e90038 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e90048 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000e90058 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x1d510 <----*
eax=022ddfa8 ebx=0000001c ecx=0000c055 edx=7c90eb94 esi=022ddfa8 edi=000905dc
eip=021f6eb2 esp=00ecfd60 ebp=0001caa8 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
*** WARNING: Unable to verify checksum for F:\Apps\TrueLaunchBar\tlb.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for F:\Apps\TrueLaunchBar\tlb.
function: tlb
021f6e97 6c insb
021f6e98 2428 and al,0x28
021f6e9a 8b5c2420 mov ebx,[esp+0x20]
021f6e9e 7419 jz tlb+0x46eb9 (021f6eb9)
021f6ea0 68a0832502 push 0x22583a0
021f6ea5 57 push edi
021f6ea6 ff15f4262702 call dword ptr [tlb+0xc26f4 (022726f4)]
021f6eac 8bf0 mov esi,eax
021f6eae 85f6 test esi,esi
021f6eb0 7407 jz tlb+0x46eb9 (021f6eb9)
FAULT ->021f6eb2 397e10 cmp [esi+0x10],edi ds:0023:022ddfb8=????????
021f6eb5 7407 jz tlb+0x46ebe (021f6ebe)
021f6eb7 33f6 xor esi,esi
021f6eb9 83fb01 cmp ebx,0x1
021f6ebc 754a jnz tlb+0x46f08 (021f6f08)
021f6ebe 81fb13010000 cmp ebx,0x113
021f6ec4 0f87b3000000 jnbe tlb+0x46f7d (021f6f7d)
021f6eca 0f8495000000 je tlb+0x46f65 (021f6f65)
021f6ed0 8d43ff lea eax,[ebx-0x1]
021f6ed3 83f820 cmp eax,0x20
021f6ed6 7730 ja tlb+0x46f08 (021f6f08)
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0001caa8 00000000 00000000 00000000 00000000 tlb+0x46eb2
*----> Raw Stack Dump <----*
0000000000ecfd60 dc fd ec 00 80 6e 1f 02 - a0 fd ec 00 00 00 00 00 .....n..........
0000000000ecfd70 83 d1 00 00 a0 fd ec 00 - 34 87 d4 77 dc 05 09 00 ........4..w....
0000000000ecfd80 1c 00 00 00 00 00 00 00 - a8 ca 01 00 80 6e 1f 02 .............n..
0000000000ecfd90 cd ab ba dc 00 00 00 00 - dc fd ec 00 80 6e 1f 02 .............n..
0000000000ecfda0 08 fe ec 00 16 88 d4 77 - 80 6e 1f 02 dc 05 09 00 .......w.n......
0000000000ecfdb0 1c 00 00 00 00 00 00 00 - a8 ca 01 00 28 2e 0f 00 ............(...
0000000000ecfdc0 dc 05 09 00 02 01 00 00 - 14 00 00 00 01 00 00 00 ................
0000000000ecfdd0 00 00 00 00 28 2e 0f 00 - 00 00 00 00 00 00 00 00 ....(...........
0000000000ecfde0 ff ff ff ff 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ecfdf0 bc fd ec 00 84 f9 ec 00 - 4c fe ec 00 67 04 d7 77 ........L...g..w
0000000000ecfe00 30 88 d4 77 00 00 00 00 - 5c fe ec 00 c0 b4 d4 77 0..w....\......w
0000000000ecfe10 28 2e 0f 00 80 6e 1f 02 - dc 05 09 00 1c 00 00 00 (....n..........
0000000000ecfe20 00 00 00 00 a8 ca 01 00 - cc ee 62 00 01 00 00 00 ..........b.....
0000000000ecfe30 00 00 00 00 28 ff ec 00 - 02 01 00 00 d9 8b d4 77 ....(..........w
0000000000ecfe40 00 00 00 00 30 fe ec 00 - 84 f9 ec 00 dc ff ec 00 ....0...........
0000000000ecfe50 67 04 d7 77 d0 b4 d4 77 - ff ff ff ff 84 fe ec 00 g..w...w........
0000000000ecfe60 0c b5 d4 77 b8 ee 62 00 - 1c 00 00 00 00 00 00 00 ...w..b.........
0000000000ecfe70 a8 ca 01 00 80 6e 1f 02 - 00 00 00 00 00 00 00 00 .....n..........
0000000000ecfe80 00 00 00 00 d4 fe ec 00 - e3 ea 90 7c 94 fe ec 00 ...........|....
0000000000ecfe90 18 00 00 00 b8 ee 62 00 - 1c 00 00 00 00 00 00 00 ......b.........
*----> State Dump for Thread Id 0x1d514 <----*
eax=7c92798d ebx=00000000 ecx=77dd6a51 edx=77dd6a18 esi=ffffffff edi=7c90fb78
eip=7c90eb94 esp=00f0ff9c ebp=00f0ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00f0ffb4 7c80b50b 00000000 7c90fb78 ffffffff ntdll!KiFastSystemCallRet
00f0ffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000000f0ff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff f0 00 \..|.y.|........
0000000000f0ffac 00 00 00 00 00 00 00 80 - ec ff f0 00 0b b5 80 7c ...............|
0000000000f0ffbc 00 00 00 00 78 fb 90 7c - ff ff ff ff 00 00 00 00 ....x..|........
0000000000f0ffcc 00 90 fd 7f 00 26 eb 89 - c0 ff f0 00 78 fb e4 87 .....&......x...
0000000000f0ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
0000000000f0ffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
0000000000f0fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f1009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f100ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f100bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f100cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x1d518 <----*
eax=000d9b48 ebx=00000000 ecx=64710003 edx=64700002 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=00f4ff70 ebp=00f4ffb4 iopl=0 nv up ei ng nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00f4ffb4 7c80b50b 00000000 00ecfce4 00ecfce8 ntdll!KiFastSystemCallRet
00f4ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000000f4ff70 1b e3 90 7c 9d 07 91 7c - ec 01 00 00 ac ff f4 00 ...|...|........
0000000000f4ff80 b0 ff f4 00 98 ff f4 00 - a0 ff f4 00 e4 fc ec 00 ................
0000000000f4ff90 e8 fc ec 00 00 00 00 00 - 00 00 00 00 b0 c0 92 01 ................
0000000000f4ffa0 00 7c 28 e8 ff ff ff ff - 35 5c 70 80 69 75 92 7c .|(.....5\p.iu.|
0000000000f4ffb0 70 39 13 00 ec ff f4 00 - 0b b5 80 7c 00 00 00 00 p9.........|....
0000000000f4ffc0 e4 fc ec 00 e8 fc ec 00 - 00 00 00 00 00 80 fd 7f ................
0000000000f4ffd0 00 26 eb 89 c0 ff f4 00 - 78 fb e4 87 ff ff ff ff .&......x.......
0000000000f4ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000000f4fff0 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 ....`..|........
0000000000f50000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f50090 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f500a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x1d51c <----*
eax=000000c0 ebx=00000000 ecx=00ecfb00 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=00f8fcec ebp=00f8ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00f8ffb4 7c80b50b 00000000 00000020 00ecfce4 ntdll!KiFastSystemCallRet
00f8ffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000000f8fcec ab e9 90 7c d5 a0 92 7c - 03 00 00 00 30 fd f8 00 ...|...|....0...
0000000000f8fcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00 ............ ...
0000000000f8fd0c e4 fc ec 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c ...........|...|
0000000000f8fd1c f4 01 00 00 1c d5 01 00 - 03 00 00 00 03 00 00 00 ................
0000000000f8fd2c 02 00 00 00 f0 01 00 00 - d8 01 00 00 b0 04 00 00 ................
0000000000f8fd3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000f8fe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x1d524 <----*
eax=00fe0010 ebx=001077d0 ecx=00001000 edx=7c90eb94 esi=00000000 edi=7ffde000
eip=7c90eb94 esp=015efd30 ebp=015efdcc iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
015efdcc 77d495f9 00000009 015efdf4 00000000 ntdll!KiFastSystemCallRet
015efe28 7c9f4e37 00000008 015efe50 ffffffff USER32!GetLastInputInfo+0x
015eff4c 7ca0a334 77f74292 00000000 7c809988 SHELL32!Ordinal646+0x21e2
015effb4 7c80b50b 00000000 7c809988 00090000 SHELL32!Ordinal753+0x133
015effec 00000000 77f74223 00ecf4d4 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
00000000015efd30 ab e9 90 7c f2 94 80 7c - 09 00 00 00 d0 77 10 00 ...|...|.....w..
00000000015efd40 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000015efd50 09 00 00 00 02 00 00 00 - 18 bd 5a 00 14 00 00 00 ..........Z.....
00000000015efd60 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
00000000015efd70 00 00 00 00 30 00 00 00 - 14 00 00 00 01 00 00 00 ....0...........
00000000015efd80 60 d1 0e 00 00 00 00 00 - 00 00 00 00 ec fd 5e 01 `.............^.
00000000015efd90 67 04 d7 77 30 88 d4 77 - 00 e0 fd 7f 00 60 fd 7f g..w0..w.....`..
00000000015efda0 00 60 fd 7f 00 00 00 00 - d0 77 10 00 e2 00 06 00 .`.......w......
00000000015efdb0 09 00 00 00 4c fd 5e 01 - 00 00 00 00 dc ff 5e 01 ....L.^.......^.
00000000015efdc0 f3 99 83 7c 90 95 80 7c - 00 00 00 00 28 fe 5e 01 ...|...|....(.^.
00000000015efdd0 f9 95 d4 77 09 00 00 00 - f4 fd 5e 01 00 00 00 00 ...w......^.....
00000000015efde0 ff ff ff ff 01 00 00 00 - 80 b5 11 00 08 00 00 00 ................
00000000015efdf0 00 00 00 00 bc 04 00 00 - 5c 04 00 00 0c 03 00 00 ........\.......
00000000015efe00 e0 02 00 00 e4 02 00 00 - 38 02 00 00 40 02 00 00 ........8...@...
00000000015efe10 44 02 00 00 14 02 00 00 - 00 00 00 00 01 00 00 00 D...............
00000000015efe20 00 60 fd 7f 14 02 00 00 - 4c ff 5e 01 37 4e 9f 7c .`......L.^.7N.|
00000000015efe30 08 00 00 00 50 fe 5e 01 - ff ff ff ff ff 04 00 00 ....P.^.........
00000000015efe40 f4 fd 5e 01 00 00 00 00 - 00 00 00 00 00 00 00 00 ..^.............
00000000015efe50 bc 04 00 00 5c 04 00 00 - 0c 03 00 00 e0 02 00 00 ....\...........
00000000015efe60 e4 02 00 00 38 02 00 00 - 40 02 00 00 44 02 00 00 ....8...@...D...
*----> State Dump for Thread Id 0x1d580 <----*
eax=7751a2bf ebx=00000000 ecx=00000000 edx=00000008 esi=01b8ff98 edi=00000000
eip=7c90eb94 esp=01b8ff58 ebp=01b8ff74 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\NETSHE
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01b8ff74 764434cb 01b8ff98 00000000 00000000 ntdll!KiFastSystemCallRet
01b8ffb4 7c80b50b 76476328 00000000 7c900000 NETSHELL!NetSetupSetProgre
01b8ffec 00000000 7644348c 76476328 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000001b8ff58 be 91 d4 77 f1 91 d4 77 - 98 ff b8 01 00 00 00 00 ...w...w........
0000000001b8ff68 00 00 00 00 00 00 00 00 - c6 91 d4 77 b4 ff b8 01 ...........w....
0000000001b8ff78 cb 34 44 76 98 ff b8 01 - 00 00 00 00 00 00 00 00 .4Dv............
0000000001b8ff88 00 00 00 00 00 00 90 7c - 00 00 00 00 28 63 47 76 .......|....(cGv
0000000001b8ff98 00 00 00 00 00 00 00 00 - 81 a8 4f 80 9c 4c 50 b8 ..........O..LP.
0000000001b8ffa8 35 5c 70 80 00 00 00 00 - dc e2 90 7c ec ff b8 01 5\p........|....
0000000001b8ffb8 0b b5 80 7c 28 63 47 76 - 00 00 00 00 00 00 90 7c ...|(cGv.......|
0000000001b8ffc8 28 63 47 76 00 d0 fa 7f - 00 26 eb 89 c0 ff b8 01 (cGv.....&......
0000000001b8ffd8 a8 fe d5 89 ff ff ff ff - f3 99 83 7c 18 b5 80 7c ...........|...|
0000000001b8ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 8c 34 44 76 .............4Dv
0000000001b8fff8 28 63 47 76 00 00 00 00 - c8 00 00 00 6b 01 00 00 (cGv........k...
0000000001b90008 ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00 ................
0000000001b90018 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... ..
0000000001b90028 e8 01 00 00 ff ef fd 7f - 0c 00 08 06 00 00 00 00 ................
0000000001b90038 00 00 00 00 00 00 00 00 - 00 00 00 00 98 05 b9 01 ................
0000000001b90048 0f 00 00 00 f8 ff ff ff - 50 00 b9 01 50 00 b9 01 ........P...P...
0000000001b90058 40 06 b9 01 00 00 00 00 - 00 00 00 00 00 00 00 00 @...............
0000000001b90068 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001b90078 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001b90088 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x1d590 <----*
eax=77e76bf0 ebx=00000000 ecx=0000000c edx=003c3750 esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=01cafe1c ebp=01caff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01caff80 77e76c22 01caffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
01caff88 77e76a3b 000d0dc0 00000000 003c0178 RPCRT4!I_RpcBCacheFree+0x5
01caffa8 77e76c0a 000d0c78 01caffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4
01caffb4 7c80b50b 0190e658 00000000 003c0178 RPCRT4!I_RpcBCacheFree+0x5
01caffec 00000000 77e76bf0 0190e658 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000001cafe1c 99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff ca 01 ...|.g.w....p...
0000000001cafe2c 00 00 00 00 10 5a 90 01 - 4c ff ca 01 00 00 00 00 .....Z..L.......
0000000001cafe3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cafe4c 00 00 00 00 02 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cafe5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cafe6c ea 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cafe7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cafe8c 00 00 00 00 00 00 00 00 - d4 3b eb b5 40 19 56 80 .........;..@.V.
0000000001cafe9c e1 a9 54 80 00 00 00 00 - f8 e9 c7 89 80 d8 c7 89 ..T.............
0000000001cafeac 00 00 00 00 00 00 00 00 - 00 00 00 00 e4 93 49 f7 ..............I.
0000000001cafebc 18 1e e3 89 02 00 00 00 - a8 1d e3 89 a8 1d e3 89 ................
0000000001cafecc c0 3b eb b5 1f 41 4e 80 - c8 e9 bb 89 98 ed 3e 88 .;...AN.......>.
0000000001cafedc 06 02 00 00 9d b7 4d 80 - 02 00 00 00 52 41 4e 80 ......M.....RAN.
0000000001cafeec 98 ed 3e 88 00 00 00 00 - f4 3b eb b5 5b 89 4a f7 ..>......;..[.J.
0000000001cafefc dc 93 49 f7 a0 ed 3e 88 - f8 e9 c7 89 80 d8 c7 89 ..I...>.........
0000000001caff0c 78 5a 97 b9 7a 89 4a f7 - bc 31 b7 85 24 3c eb b5 xZ..z.J..1..$<..
0000000001caff1c b2 c2 4d 80 ba c2 4d 80 - 8c 31 b7 85 20 30 b7 85 ..M...M..1.. 0..
0000000001caff2c 54 30 b7 85 80 ff ca 01 - 99 66 e7 77 4c ff ca 01 T0.......f.wL...
0000000001caff3c a9 66 e7 77 ed 10 90 7c - f0 23 90 01 58 e6 90 01 .f.w...|.#..X...
0000000001caff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0x1d634 <----*
eax=77e76bf0 ebx=00000000 ecx=00090178 edx=00090000 esi=000d0dc0 edi=000d0e64
eip=7c90eb94 esp=01e3fe1c ebp=01e3ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01e3ff80 77e76c22 01e3ffa8 77e76a3b 000d0dc0 ntdll!KiFastSystemCallRet
01e3ff88 77e76a3b 000d0dc0 01b931e8 00000018 RPCRT4!I_RpcBCacheFree+0x5
01e3ffa8 77e76c0a 000d0c78 01e3ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x4
01e3ffb4 7c80b50b 001313c8 01b931e8 00000018 RPCRT4!I_RpcBCacheFree+0x5
01e3ffec 00000000 77e76bf0 001313c8 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000001e3fe1c 99 e3 90 7c 03 67 e7 77 - ac 01 00 00 70 ff e3 01 ...|.g.w....p...
0000000001e3fe2c 00 00 00 00 c8 00 92 01 - 54 ff e3 01 00 00 00 00 ........T.......
0000000001e3fe3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fe9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3feac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3febc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fecc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fedc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3feec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e3fefc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 01 ................
0000000001e3ff0c 00 00 00 01 00 00 00 01 - bc 51 b0 85 24 dc ff b7 .........Q..$...
0000000001e3ff1c b2 c2 4d 80 ba c2 4d 80 - 8c 51 b0 85 20 50 b0 85 ..M...M..Q.. P..
0000000001e3ff2c 54 50 b0 85 80 ff e3 01 - 99 66 e7 77 4c ff e3 01 TP.......f.wL...
0000000001e3ff3c a9 66 e7 77 ed 10 90 7c - f0 04 13 00 c8 13 13 00 .f.w...|........
0000000001e3ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0x1d684 <----*
eax=00000004 ebx=000003b8 ecx=002826a0 edx=7f6f0801 esi=0000004a edi=01f6f45c
eip=7c90eb94 esp=01f6f3b8 ebp=01f6f3f4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\System32\stobje
ChildEBP RetAddr Args to Child
01f6f3f4 77d4e4ab 00020078 0000004a 00120520 ntdll!KiFastSystemCallRet
01f6f41c 7ca21c37 00020078 0000004a 00120520 USER32!SendMessageTimeoutW
01f6f828 7645476d 00000001 01f6f83c 01f6fc84 SHELL32!Shell_NotifyIconW+
01f6fbf8 76454c4a 00000000 000000be 01f6fc1c NETSHELL!NetSetupSetProgre
01f6fc08 7640f555 00120520 00000000 000000be NETSHELL!NetSetupSetProgre
01f6fc1c 77d48734 00120520 00000405 00000000 NETSHELL!NormalizeExtended
01f6fc48 77d48816 76401b9f 00120520 00000405 USER32!GetDC+0x6d
01f6fcb0 77d489cd 00136120 76401b9f 00120520 USER32!GetDC+0x14f
01f6fd10 77d48a10 01f6fd68 00000000 01f6fd8c USER32!GetWindowLongW+0x12
01f6fd20 7628155a 01f6fd68 00000000 76280000 USER32!DispatchMessageW+0x
01f6fd8c 76283746 76280000 00000000 00040338 stobject+0x155a
01f6ffb4 7c80b50b 00000000 00000000 00000000 stobject!DllCanUnloadNow+0
01f6ffec 00000000 762836f7 00000000 00000000 kernel32!GetModuleFileName
*----> Raw Stack Dump <----*
0000000001f6f3b8 be 94 d4 77 73 e4 d4 77 - 78 00 02 00 4a 00 00 00 ...ws..wx...J...
0000000001f6f3c8 20 05 12 00 48 f4 f6 01 - e4 f3 f6 01 b2 02 00 00 ...H...........
0000000001f6f3d8 00 00 00 00 f4 fb f6 01 - 01 00 00 00 03 00 00 00 ................
0000000001f6f3e8 a0 0f 00 00 00 00 00 00 - 00 00 00 00 1c f4 f6 01 ................
0000000001f6f3f8 ab e4 d4 77 78 00 02 00 - 4a 00 00 00 20 05 12 00 ...wx...J... ...
0000000001f6f408 48 f4 f6 01 03 00 00 00 - a0 0f 00 00 5c f4 f6 01 H...........\...
0000000001f6f418 00 00 00 00 28 f8 f6 01 - 37 1c a2 7c 78 00 02 00 ....(...7..|x...
0000000001f6f428 4a 00 00 00 20 05 12 00 - 48 f4 f6 01 03 00 00 00 J... ...H.......
0000000001f6f438 a0 0f 00 00 5c f4 f6 01 - 9f 1b 40 76 00 00 00 00 ....\.....@v....
0000000001f6f448 01 00 00 00 c0 03 00 00 - 64 f4 f6 01 3c f8 f6 01 ........d...<...
0000000001f6f458 78 00 02 00 00 00 00 00 - 3f 00 00 00 23 34 75 34 x.......?...#4u4
0000000001f6f468 01 00 00 00 b8 03 00 00 - 20 05 12 00 00 00 00 00 ........ .......
0000000001f6f478 0a 00 00 00 00 00 00 00 - 3d 07 6a 00 00 00 00 00 ........=.j.....
0000000001f6f488 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f498 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f4a8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f4b8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f4c8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f4d8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001f6f4e8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
DrWatson is not useful for Blue screen problem. Attach the minidump at the webspace.
ASKER
Thanks,
My original message indicates the location of my minidump post. Here it is
I posted my minidump and a current profile of my system on the following url.
http://www.dvalen.com/mini_dumps_files.htm
Thanks
My original message indicates the location of my minidump post. Here it is
I posted my minidump and a current profile of my system on the following url.
http://www.dvalen.com/mini_dumps_files.htm
Thanks
ASKER
Hello,
I am not sure what to do at this point. Test all RAMS both with MEMTEST, DLDiag, and 3Dmark. Changed the video card. I really don't want to re-install windows again.
Any other suggestions.
THanks
Danny
I am not sure what to do at this point. Test all RAMS both with MEMTEST, DLDiag, and 3Dmark. Changed the video card. I really don't want to re-install windows again.
Any other suggestions.
THanks
Danny
ASKER
Hello,
Here is an update. I downloaded the latest version of memtest and ran it and got several errors, that it could not write to certain memory ranges.
I made some adjustment to my Bios and swtich some setting to were it indicate that it would create a more stable system. I made some adjustment o the AGP section and DRAM section. at this moment I forgot what I adjusted. I ran the memtest again and got no error. I actually ran it overnight.
So far no blue screen. I am not sure how else to test it or re-create the BSOD and make sure I don't get it again. when I get home later today, I am going to try google earth, because I know that last time I got the BSOD when using the app.
Let me know if you have any suggestions.
Thanks
Danny
Here is an update. I downloaded the latest version of memtest and ran it and got several errors, that it could not write to certain memory ranges.
I made some adjustment to my Bios and swtich some setting to were it indicate that it would create a more stable system. I made some adjustment o the AGP section and DRAM section. at this moment I forgot what I adjusted. I ran the memtest again and got no error. I actually ran it overnight.
So far no blue screen. I am not sure how else to test it or re-create the BSOD and make sure I don't get it again. when I get home later today, I am going to try google earth, because I know that last time I got the BSOD when using the app.
Let me know if you have any suggestions.
Thanks
Danny
well, if you got errors with memtest, i would test the sticks 1 at the time, and check the good (or bad ones)
i would not use a reported bad memory stick again, unless extensive tests show no problem.
You can ruin your files on disk when using bad ram.
i would not use a reported bad memory stick again, unless extensive tests show no problem.
You can ruin your files on disk when using bad ram.
ASKER
Ok, but I re-ran the test again after making some changes in my bios and did not get any error message in memtest. What would that mean? Why did I not get the error message again?
Thanks
Thanks
Do you downclock the ram?
>> but I re-ran the test again << for how long? min i should run 3 passes
ASKER
Hi,
I would have to check if I downclock the ram, but I really doubt it.
Nobus, - I re-ran the test for about 10 hours overnight and not a single error.
Let me know what you think. I would I not get the error now?
Danny
I would have to check if I downclock the ram, but I really doubt it.
Nobus, - I re-ran the test for about 10 hours overnight and not a single error.
Let me know what you think. I would I not get the error now?
Danny
ASKER CERTIFIED SOLUTION
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
ASKER
Thanks,
I applied the changes based on the manual I have, but since I am here at work, I can't remember what changes I made. When I was making the changes, I obviously knew what changes I was making. All I can remember right now is I disable something for the AGP. I also now remembering that I changed the RAM to be used for AGP from 256mb to 128mb.
Thanks
Danny
I applied the changes based on the manual I have, but since I am here at work, I can't remember what changes I made. When I was making the changes, I obviously knew what changes I was making. All I can remember right now is I disable something for the AGP. I also now remembering that I changed the RAM to be used for AGP from 256mb to 128mb.
Thanks
Danny
ASKER
I have not had a BSOD in a week. I believe the changes that I made in the Bios helped. I will post the changes I made when I get home
Thanks all
Danny
Thanks all
Danny
I am the first person to identify the problem is related to ram (underclock the ram) or video ram. Why I don't get any points ??
Mini030406-01.dmp BugCheck 10000050, {ffbea4e8, 0, f7b5570e, 0}
8874c778: Unable to get thread contents
Mini032306-01.dmp BugCheck 100000D1, {c2e89180, 2, 0, f77efe21}
Probably caused by : usbuhci.sys ( usbuhci!UhciAllocTd+1f )
Mini032306-02.dmp BugCheck 100000EA, {887d82d8, 88b50128, f78aecb4, 1}
DEFAULT_BUCKET_ID: GRAPHICS_DRIVER_FAULT
Probably caused by : nv4_mini.sys ( nv4_mini+53d6c )
Mini032506-01.dmp BugCheck 1000008E, {c000001d, f778f684, b6ba8410, 0}
Probably caused by : watchdog.sys ( watchdog!WdExitMonitoredSe
Mini032606-01.dmp BugCheck 100000D1, {5327e686, 2, 0, b7abed59}
Probably caused by : mrxsmb.sys ( mrxsmb!MRxSmbReadHandler_N
Mini032606-02.dmp BugCheck 100000D1, {0, 2, 0, 0}
Finding
Mini032506-01.dmp is crashed with NT status code c000001d (illegal instruction) and it is the sign of faulty ram. Mini032306-02.dmp is crashed with bugcheck code EA and it is the sign of faulty ram or video card.
The culprit is faulty ram (60%), video card (30%) and M/B (10%).
Suugestion
1 Some faulty ram can pass memtest. Reseat the memory to another slot or downclock the ram
2 Run 3DMark 2005 to test your video card