Jump to content

Fehlermeldung Dr. Watson


Gast karlk

Empfohlene Beiträge

Hallo,

 

mehrmals täglich kommt bei mir der Dr. Watson, weil sich mein Explorer verabschiedet.

Anbei das LOG.

 

Kann mir da einer HELFEN!?!?!

 

DANKE.

 

cu

karlk

 

 

Anwendungsausnahme aufgetreten:

Anwendung: C:\WINDOWS\Explorer.exe (pid=4016)

Wann: 15.03.2006 @ 10:40:39.890

Ausnahmenummer: c0000005 (Zugriffsverletzung)

 

*----> Systeminformationen <----*

Computername: PC22

Benutzername: xxxxx

Terminalsitzungskennung: 0

Prozessoranzahl: 2

Prozessortyp: x86 Family 15 Model 4 Stepping 1

Windows-Version: 5.1

Aktuelles Build: 2600

Service Pack: 2

Aktueller Typ: Multiprocessor Free

Firma: yyyyyy

Besitzer: PC22

 

*----> Taskliste <----*

0 System Process

4 System

476 smss.exe

528 csrss.exe

552 winlogon.exe

596 services.exe

608 lsass.exe

772 svchost.exe

840 svchost.exe

908 svchost.exe

1028 svchost.exe

1108 svchost.exe

1264 spoolsv.exe

1500 AVWUPSRV.EXE

1520 CDAC11BA.EXE

1632 ibguard.exe

1744 SMAgent.exe

1772 svchost.exe

1816 wdfmgr.exe

516 SMax4PNP.exe

660 Smax4.exe

732 dpmw32.exe

744 NWTRAY.EXE

1016 c3wamail.exe

1060 jusched.exe

1104 iTouch.exe

1136 mm_tray.exe

1184 acrotray.exe

1328 Smartset 2000.exe

1336 em_exec.exe

1376 ScannerFinder.exe

1340 GrpWise.exe

1380 HpHab655.exe

2016 Notify.exe

236 ibserver.exe

1304 alg.exe

3588 AVGUARD.EXE

3668 AVESVC.EXE

3692 AVMAILC.EXE

3732 AVGNT.EXE

2768 pcsws.exe

2800 PCSCM.EXE

2944 cwblmsrv.exe

2488 pcsws.exe

3172 HpHab200.exe

3224 WINWORD.EXE

4016 Explorer.exe

3684 EXCEL.EXE

1008 ADDRBOOK.EXE

2536 drwtsn32.exe

 

*----> Modulliste <----*

(0000000000a90000 - 0000000000a97000: C:\Programme\Logitech\iTouch\iTchHk.dll

(0000000000f30000 - 0000000000f37000: C:\Programme\Logitech\iTouch\kbdhook.dll

(0000000001000000 - 00000000010ff000: C:\WINDOWS\Explorer.exe

(00000000011f0000 - 0000000001201000: C:\WINDOWS\system32\MSVCIRT.dll

(0000000001ed0000 - 0000000001eed000: C:\WINDOWS\system32\NLS\DEUTSCH\NWSHLXNR.DLL

(0000000001f00000 - 0000000001f74000: C:\WINDOWS\system32\NLS\DEUTSCH\NOVNPNTR.DLL

(0000000001f90000 - 0000000001f9b000: C:\Programme\Gemeinsame Dateien\Logitech\Scrolling\LgMsgHk.dll

(0000000001fc0000 - 0000000001fcb000: C:\Programme\Adobe\Acrobat 6.0\Acrobat\ActiveX\AcroIEHelper.dll

(0000000002080000 - 0000000002093000: C:\WINDOWS\system32\browselc.dll

(0000000002980000 - 0000000002af3000: C:\Programme\Gemeinsame Dateien\Ahead\Lib\NeroDigitalExt.dll

(0000000002da0000 - 0000000002e2e000: C:\WINDOWS\system32\shdoclc.dll

(0000000002f10000 - 0000000002f4d000: C:\WINDOWS\system32\ODBC32.dll

(00000000030d0000 - 00000000030e9000: C:\WINDOWS\system32\odbcint.dll

(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll

(0000000010000000 - 0000000010007000: C:\Programme\Logitech\MouseWare\System\LgWndHk.dll

(0000000020000000 - 00000000202d9000: C:\WINDOWS\system32\xpsp2res.dll

(000000004eba0000 - 000000004ed43000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll

(000000004ef20000 - 000000004efb3000: C:\WINDOWS\system32\wiashext.dll

(0000000050d00000 - 0000000050d15000: C:\WINDOWS\system32\CLNWIN32.DLL

(0000000050d20000 - 0000000050d4b000: C:\WINDOWS\system32\CALWIN32.DLL

(0000000050d50000 - 0000000050d97000: C:\WINDOWS\system32\NETWIN32.DLL

(0000000050da0000 - 0000000050dab000: C:\WINDOWS\system32\CLXWIN32.DLL

(0000000050db0000 - 0000000050ddb000: C:\WINDOWS\system32\NCPWIN32.dll

(0000000050df0000 - 0000000050e10000: C:\WINDOWS\system32\LOCWIN32.DLL

(0000000058200000 - 00000000582c9000: C:\WINDOWS\system32\NOVNPNT.DLL

(0000000058300000 - 0000000058338000: C:\WINDOWS\system32\MAPBASE.dll

(0000000058380000 - 00000000583bd000: C:\WINDOWS\system32\NWSHLXNT.dll

(00000000597d0000 - 0000000059824000: C:\WINDOWS\system32\NETAPI32.dll

(0000000059d40000 - 0000000059d4d000: C:\WINDOWS\system32\twext.dll

(000000005b0f0000 - 000000005b128000: C:\WINDOWS\system32\UxTheme.dll

(000000005b9b0000 - 000000005ba22000: C:\WINDOWS\system32\themeui.dll

(000000005ce90000 - 000000005cefe000: C:\WINDOWS\system32\shimgvw.dll

(000000005cf00000 - 000000005cf26000: C:\WINDOWS\system32\ShimEng.dll

(000000005d450000 - 000000005d4e7000: C:\WINDOWS\system32\comctl32.dll

(0000000061dc0000 - 0000000061dce000: C:\WINDOWS\system32\MFC42LOC.DLL

(0000000063670000 - 0000000063674000: C:\Programme\IBM\Client Access\Mri2929\CWBMSGB.DLL

(00000000654d0000 - 00000000654d8000: C:\Programme\IBM\Client Access\Shared\cwbunddh.dll

(00000000668d0000 - 00000000668e2000: C:\WINDOWS\system32\cwbadnrt.dll

(0000000067170000 - 0000000067177000: C:\WINDOWS\system32\cwbuireg.dll

(00000000671a0000 - 00000000671bc000: C:\WINDOWS\system32\cwbsv.dll

(00000000673a0000 - 00000000673ca000: C:\WINDOWS\system32\cwbrw.dll

(0000000067480000 - 0000000067486000: C:\WINDOWS\system32\cwbnltrn.dll

(0000000067490000 - 0000000067496000: C:\WINDOWS\system32\cwbnldlg.dll

(00000000674a0000 - 00000000674a9000: C:\WINDOWS\system32\cwbnl1.dll

(00000000674b0000 - 00000000674c8000: C:\WINDOWS\system32\cwbnl.dll

(00000000674e0000 - 00000000674e9000: C:\WINDOWS\system32\cwbmsgbx.dll

(0000000067600000 - 0000000067606000: C:\WINDOWS\system32\cwbcftft.dll

(0000000067610000 - 0000000067628000: C:\WINDOWS\system32\cwbcf.dll

(0000000067670000 - 0000000067678000: C:\WINDOWS\system32\cwbbb1.dll

(00000000676b0000 - 00000000676bd000: C:\WINDOWS\system32\cwbad.dll

(00000000676c0000 - 00000000676c6000: C:\WINDOWS\system32\cwbab1.dll

(00000000676d0000 - 00000000676db000: C:\WINDOWS\system32\cwbab.dll

(000000006a400000 - 000000006a41c000: C:\WINDOWS\system32\NLS\DEUTSCH\MAPBASER.DLL

(000000006c670000 - 000000006c6bd000: C:\WINDOWS\system32\DUSER.dll

(000000006fd90000 - 000000006ff5a000: C:\WINDOWS\AppPatch\AcGenral.DLL

(0000000071a00000 - 0000000071a08000: C:\WINDOWS\system32\WS2HELP.dll

(0000000071a10000 - 0000000071a27000: C:\WINDOWS\system32\WS2_32.dll

(0000000071a30000 - 0000000071a3a000: C:\WINDOWS\system32\WSOCK32.dll

(0000000071a80000 - 0000000071a92000: C:\WINDOWS\system32\MPR.dll

(0000000071b70000 - 0000000071b83000: C:\WINDOWS\System32\SAMLIB.dll

(0000000071b90000 - 0000000071b9e000: C:\WINDOWS\System32\ntlanman.dll

(0000000071c00000 - 0000000071c07000: C:\WINDOWS\System32\NETRAP.dll

(0000000071c10000 - 0000000071c50000: C:\WINDOWS\System32\NETUI1.dll

(0000000071c50000 - 0000000071c67000: C:\WINDOWS\System32\NETUI0.dll

(0000000071cc0000 - 0000000071cdc000: C:\WINDOWS\system32\actxprxy.dll

(0000000072c80000 - 0000000072c88000: C:\WINDOWS\system32\msacm32.drv

(0000000072c90000 - 0000000072c99000: C:\WINDOWS\system32\wdmaud.drv

(0000000072f70000 - 0000000072f96000: C:\WINDOWS\system32\WINSPOOL.DRV

(00000000732f0000 - 0000000073348000: C:\WINDOWS\system32\zipfldr.dll

(0000000073b10000 - 0000000073b24000: C:\WINDOWS\system32\sti.dll

(0000000073d30000 - 0000000073e2e000: C:\WINDOWS\system32\MFC42.DLL

(00000000745e0000 - 00000000748a6000: C:\WINDOWS\system32\msi.dll

(0000000074a50000 - 0000000074a58000: C:\WINDOWS\system32\POWRPROF.dll

(0000000074a60000 - 0000000074a67000: C:\WINDOWS\system32\CFGMGR32.dll

(0000000074a70000 - 0000000074a7a000: C:\WINDOWS\system32\BatMeter.dll

(0000000074ab0000 - 0000000074af8000: C:\WINDOWS\system32\webcheck.dll

(0000000074b00000 - 0000000074b90000: C:\WINDOWS\system32\printui.dll

(0000000075910000 - 0000000075a09000: C:\WINDOWS\system32\MSGINA.dll

(0000000075dc0000 - 0000000075e51000: C:\WINDOWS\system32\MLANG.dll

(0000000075f00000 - 0000000075f07000: C:\WINDOWS\System32\drprov.dll

(0000000075f10000 - 0000000075f19000: C:\WINDOWS\System32\davclnt.dll

(0000000075f20000 - 000000007601d000: C:\WINDOWS\system32\BROWSEUI.dll

(0000000076020000 - 0000000076085000: C:\WINDOWS\system32\MSVCP60.dll

(0000000076300000 - 0000000076310000: C:\WINDOWS\system32\WINSTA.dll

(0000000076320000 - 0000000076325000: C:\WINDOWS\system32\MSIMG32.dll

(0000000076350000 - 000000007639a000: C:\WINDOWS\system32\comdlg32.dll

(00000000763a0000 - 000000007654b000: C:\WINDOWS\system32\NETSHELL.dll

(00000000765a0000 - 00000000765bd000: C:\WINDOWS\System32\CSCDLL.dll

(00000000765c0000 - 00000000765e1000: C:\WINDOWS\system32\stobject.dll

(0000000076620000 - 00000000766d5000: C:\WINDOWS\system32\USERENV.dll

(0000000076730000 - 0000000076739000: C:\WINDOWS\system32\SHFOLDER.dll

(0000000076880000 - 0000000076905000: C:\WINDOWS\system32\CRYPTUI.dll

(0000000076930000 - 0000000076938000: C:\WINDOWS\system32\LINKINFO.dll

(0000000076940000 - 0000000076966000: C:\WINDOWS\system32\ntshrui.dll

(0000000076970000 - 0000000076a21000: C:\WINDOWS\system32\SXS.DLL

(0000000076ad0000 - 0000000076ae1000: C:\WINDOWS\system32\ATL.DLL

(0000000076af0000 - 0000000076b1e000: C:\WINDOWS\system32\WINMM.dll

(0000000076bc0000 - 0000000076bef000: C:\WINDOWS\system32\credui.dll

(0000000076bf0000 - 0000000076c1e000: C:\WINDOWS\system32\WINTRUST.dll

(0000000076c50000 - 0000000076c78000: C:\WINDOWS\system32\IMAGEHLP.dll

(0000000076d20000 - 0000000076d39000: C:\WINDOWS\system32\iphlpapi.dll

(0000000076dd0000 - 0000000076df5000: C:\WINDOWS\system32\adsldpc.dll

(0000000076e40000 - 0000000076e4e000: C:\WINDOWS\system32\rtutils.dll

(0000000076f10000 - 0000000076f18000: C:\WINDOWS\system32\WTSAPI32.dll

(0000000076f20000 - 0000000076f4d000: C:\WINDOWS\system32\WLDAP32.dll

(0000000076f90000 - 000000007700f000: C:\WINDOWS\system32\CLBCATQ.DLL

(0000000077010000 - 00000000770e3000: C:\WINDOWS\system32\COMRes.dll

(00000000770f0000 - 000000007717c000: C:\WINDOWS\system32\OLEAUT32.dll

(0000000077180000 - 0000000077227000: C:\WINDOWS\system32\WININET.dll

(0000000077230000 - 00000000772ce000: C:\WINDOWS\system32\urlmon.dll

(00000000773a0000 - 00000000774a2000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll

(00000000774b0000 - 00000000775ed000: C:\WINDOWS\system32\ole32.dll

(0000000077660000 - 0000000077681000: C:\WINDOWS\system32\NTMARTA.DLL

(0000000077730000 - 000000007789c000: C:\WINDOWS\system32\SHDOCVW.dll

(00000000778f0000 - 00000000779e4000: C:\WINDOWS\system32\SETUPAPI.dll

(00000000779f0000 - 0000000077a46000: C:\WINDOWS\System32\cscui.dll

(0000000077a50000 - 0000000077ae5000: C:\WINDOWS\system32\CRYPT32.dll

(0000000077af0000 - 0000000077b02000: C:\WINDOWS\system32\MSASN1.dll

(0000000077b10000 - 0000000077b32000: C:\WINDOWS\system32\appHelp.dll

(0000000077ba0000 - 0000000077ba7000: C:\WINDOWS\system32\midimap.dll

(0000000077bb0000 - 0000000077bc5000: C:\WINDOWS\system32\MSACM32.dll

(0000000077bd0000 - 0000000077bd8000: C:\WINDOWS\system32\VERSION.dll

(0000000077be0000 - 0000000077c38000: C:\WINDOWS\system32\msvcrt.dll

(0000000077c90000 - 0000000077cc3000: C:\WINDOWS\system32\ACTIVEDS.dll

(0000000077d10000 - 0000000077da0000: C:\WINDOWS\system32\USER32.dll

(0000000077da0000 - 0000000077e4a000: C:\WINDOWS\system32\ADVAPI32.dll

(0000000077e50000 - 0000000077ee1000: C:\WINDOWS\system32\RPCRT4.dll

(0000000077ef0000 - 0000000077f36000: C:\WINDOWS\system32\GDI32.dll

(0000000077f40000 - 0000000077fb6000: C:\WINDOWS\system32\SHLWAPI.dll

(0000000077fc0000 - 0000000077fd1000: C:\WINDOWS\system32\Secur32.dll

(000000007c140000 - 000000007c243000: C:\Programme\Gemeinsame Dateien\Ahead\Lib\MFC71.DLL

(000000007c340000 - 000000007c396000: C:\Programme\Gemeinsame Dateien\Ahead\Lib\MSVCR71.dll

(000000007c3a0000 - 000000007c41b000: C:\Programme\Gemeinsame Dateien\Ahead\Lib\MSVCP71.dll

(000000007c800000 - 000000007c906000: C:\WINDOWS\system32\kernel32.dll

(000000007c910000 - 000000007c9c7000: C:\WINDOWS\system32\ntdll.dll

(000000007c9d0000 - 000000007d1ee000: C:\WINDOWS\system32\SHELL32.dll

 

*----> Statusabbild für Threadkennung 0xfb8 <----*

 

eax=00000000 ebx=00000003 ecx=0007fe60 edx=7c91eb94 esi=000f0ea8 edi=00000000

eip=7c91eb94 esp=0007fef0 ebp=0007ff08 iopl=0 nv up ei pl nz na pe nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

 

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SHELL32.dll -

WARNING: Stack unwind information not available. Following frames may be wrong.

*** ERROR: Module load completed but symbols could not be loaded for C:\WINDOWS\Explorer.exe

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -

ChildEBP RetAddr Args to Child

0007ff08 7ca1be04 00000000 0007ff5c 01016e95 ntdll!KiFastSystemCallRet

0007ff14 01016e95 000f0ea8 7ffde000 0007ffc0 SHELL32!Ordinal201+0x28

0007ff5c 0101e2b6 00000000 00000000 00020804 Explorer+0x16e95

0007ffc0 7c816d4f 000749e0 0006ecdc 7ffde000 Explorer+0x1e2b6

0007fff0 00000000 0101e24e 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49

 

*----> Raw Stack Dump <----*

000000000007fef0 18 94 d1 77 6a 3b a3 7c - ac 92 80 7c a8 0e 0f 00 ...wj;.|...|....

000000000007ff00 a8 0e 0f 00 14 ff 07 00 - 14 ff 07 00 04 be a1 7c ...............|

000000000007ff10 00 00 00 00 5c ff 07 00 - 95 6e 01 01 a8 0e 0f 00 ....\....n......

000000000007ff20 00 e0 fd 7f c0 ff 07 00 - 00 00 00 00 24 fd 07 00 ............$...

000000000007ff30 50 ff 07 00 e0 ff 07 00 - 27 e0 91 7c ed aa 80 7c P.......'..|...|

000000000007ff40 ff ff ff ff 0c 00 00 00 - 00 00 00 00 64 59 43 00 ............dYC.

000000000007ff50 a8 00 00 00 01 00 00 00 - a8 0e 0f 00 c0 ff 07 00 ................

000000000007ff60 b6 e2 01 01 00 00 00 00 - 00 00 00 00 04 08 02 00 ................

000000000007ff70 0a 00 00 00 e0 49 07 00 - dc ec 06 00 44 00 00 00 .....I......D...

000000000007ff80 44 08 02 00 24 08 02 00 - 08 08 02 00 00 00 00 00 D...$...........

000000000007ff90 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000007ffa0 00 00 00 00 00 00 00 00 - 00 00 00 00 05 00 00 00 ................

000000000007ffb0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000007ffc0 f0 ff 07 00 4f 6d 81 7c - e0 49 07 00 dc ec 06 00 ....Om.|.I......

000000000007ffd0 00 e0 fd 7f fa 02 55 80 - c8 ff 07 00 28 27 4f 86 ......U.....('O.

000000000007ffe0 ff ff ff ff f3 99 83 7c - 58 6d 81 7c 00 00 00 00 .......|Xm.|....

000000000007fff0 00 00 00 00 00 00 00 00 - 4e e2 01 01 00 00 00 00 ........N.......

0000000000080000 41 63 74 78 20 00 00 00 - 01 00 00 00 98 24 00 00 Actx ........$..

0000000000080010 c4 00 00 00 00 00 00 00 - 20 00 00 00 00 00 00 00 ........ .......

0000000000080020 14 00 00 00 01 00 00 00 - 06 00 00 00 34 00 00 00 ............4...

 

*----> Statusabbild für Threadkennung 0xfc0 <----*

 

eax=00000012 ebx=77d1b8ba ecx=77d1882a edx=7c91eb94 esi=010460d8 edi=00000000

eip=7c91eb94 esp=0118ff14 ebp=0118ff44 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

WARNING: Stack unwind information not available. Following frames may be wrong.

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\SHLWAPI.dll -

ChildEBP RetAddr Args to Child

0118ff44 01011e8b 00000000 0118ffb4 77f54292 ntdll!KiFastSystemCallRet

0118ff50 77f54292 010460d8 0000005c 0007fc04 Explorer+0x11e8b

0118ffb4 7c80b50b 00000000 0000005c 0007fc04 SHLWAPI!Ordinal505+0x3e9

0118ffec 00000000 77f54223 0007fdbc 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

000000000118ff14 18 94 d1 77 40 1a 00 01 - 00 00 00 00 d8 60 04 01 ...w@........`..

000000000118ff24 00 00 00 00 d0 00 03 00 - 2a c0 00 00 04 00 00 00 ........*.......

000000000118ff34 72 04 25 00 a3 e6 af 00 - d3 02 00 00 d6 01 00 00 r.%.............

000000000118ff44 50 ff 18 01 8b 1e 01 01 - 00 00 00 00 b4 ff 18 01 P...............

000000000118ff54 92 42 f5 77 d8 60 04 01 - 5c 00 00 00 04 fc 07 00 .B.w.`..\.......

000000000118ff64 bc fd 07 00 62 1e 01 01 - b1 79 01 01 b0 01 00 00 ....b....y......

000000000118ff74 d8 60 04 01 08 00 00 00 - 00 00 00 00 00 00 00 00 .`..............

000000000118ff84 00 00 00 00 00 00 00 00 - 00 00 00 00 20 80 60 86 ............ .`.

000000000118ff94 1c b9 4f 80 00 00 00 00 - 00 00 00 00 00 00 00 00 ..O.............

000000000118ffa4 24 b9 4f 80 00 00 00 00 - f2 0e 70 80 dc e2 91 7c $.O.......p....|

000000000118ffb4 ec ff 18 01 0b b5 80 7c - 00 00 00 00 5c 00 00 00 .......|....\...

000000000118ffc4 04 fc 07 00 bc fd 07 00 - 00 a0 fd 7f 00 e6 7b 86 ..............{.

000000000118ffd4 c0 ff 18 01 c0 de 43 86 - ff ff ff ff f3 99 83 7c ......C........|

000000000118ffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............

000000000118fff4 23 42 f5 77 bc fd 07 00 - 00 00 00 00 00 00 00 00 #B.w............

0000000001190004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000001190014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000001190024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000001190034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000001190044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

 

*----> Statusabbild für Threadkennung 0xfc4 <----*

 

eax=000000c0 ebx=00000000 ecx=77da6a51 edx=77da6a18 esi=ffffffff edi=7c91fb78

eip=7c91eb94 esp=011cff9c ebp=011cffb4 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

WARNING: Stack unwind information not available. Following frames may be wrong.

ChildEBP RetAddr Args to Child

011cffb4 7c80b50b 00000000 7c91fb78 ffffffff ntdll!KiFastSystemCallRet

011cffec 00000000 7c93798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

00000000011cff9c 5c d8 91 7c d4 79 93 7c - 01 00 00 00 ac ff 1c 01 \..|.y.|........

00000000011cffac 00 00 00 00 00 00 00 80 - ec ff 1c 01 0b b5 80 7c ...............|

00000000011cffbc 00 00 00 00 78 fb 91 7c - ff ff ff ff 00 00 00 00 ....x..|........

00000000011cffcc 00 90 fd 7f 00 e6 7b 86 - c0 ff 1c 01 30 c2 35 86 ......{.....0.5.

00000000011cffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....

00000000011cffec 00 00 00 00 00 00 00 00 - 8d 79 93 7c 00 00 00 00 .........y.|....

00000000011cfffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d00ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d00bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000011d00cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

 

*----> Statusabbild für Threadkennung 0x704 <----*

 

eax=000000c0 ebx=00000000 ecx=0118fb00 edx=00000000 esi=00000000 edi=00000001

eip=7c91eb94 esp=0124fcec ebp=0124ffb4 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

WARNING: Stack unwind information not available. Following frames may be wrong.

ChildEBP RetAddr Args to Child

0124ffb4 7c80b50b 00000000 00000020 0118fce4 ntdll!KiFastSystemCallRet

0124ffec 00000000 7c939fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

000000000124fcec ab e9 91 7c d5 a0 93 7c - 03 00 00 00 30 fd 24 01 ...|...|....0.$.

000000000124fcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 20 00 00 00 ............ ...

000000000124fd0c e4 fc 18 01 00 00 00 00 - 08 e5 98 7c 08 e5 98 7c ...........|...|

000000000124fd1c e0 01 00 00 04 07 00 00 - 03 00 00 00 03 00 00 00 ................

000000000124fd2c 02 00 00 00 dc 01 00 00 - c4 01 00 00 bc 04 00 00 ................

000000000124fd3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fd4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fd5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fd6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fd7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fd8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000124fe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

 

*----> Statusabbild für Threadkennung 0xfd0 <----*

 

eax=00fe0010 ebx=00180ba0 ecx=00000002 edx=7c91eb94 esi=00000000 edi=7ffde000

eip=7c91eb94 esp=012afd30 ebp=012afdcc iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -

WARNING: Stack unwind information not available. Following frames may be wrong.

ChildEBP RetAddr Args to Child

012afdcc 77d195f9 00000009 012afdf4 00000000 ntdll!KiFastSystemCallRet

012afe28 7ca04e1f 00000008 012afe50 ffffffff USER32!GetLastInputInfo+0x105

012aff4c 7ca1a300 77f54292 00000000 7c809988 SHELL32!Ordinal646+0x21ea

012affb4 7c80b50b 00000000 7c809988 00090000 SHELL32!Ordinal753+0x133

012affec 00000000 77f54223 0118f4d4 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

00000000012afd30 ab e9 91 7c f2 94 80 7c - 09 00 00 00 a0 0b 18 00 ...|...|........

00000000012afd40 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000012afd50 09 00 00 00 02 00 00 00 - cb b4 d1 77 0c b5 d1 77 ...........w...w

00000000012afd60 a8 a2 5c 00 99 c0 00 00 - b8 6a 13 02 1c b5 d1 77 ..\......j.....w

00000000012afd70 00 00 00 00 00 00 00 00 - 14 00 00 00 01 00 00 00 ................

00000000012afd80 58 86 0d 00 00 00 00 00 - 00 00 00 00 18 00 00 00 X...............

00000000012afd90 a8 a2 5c 00 99 c0 00 00 - 00 e0 fd 7f 00 60 fd 7f ..\..........`..

00000000012afda0 00 60 fd 7f 00 00 00 00 - a0 0b 18 00 a8 93 d1 77 .`.............w

00000000012afdb0 09 00 00 00 4c fd 2a 01 - 00 00 00 00 dc ff 2a 01 ....L.*.......*.

00000000012afdc0 f3 99 83 7c 90 95 80 7c - 00 00 00 00 28 fe 2a 01 ...|...|....(.*.

00000000012afdd0 f9 95 d1 77 09 00 00 00 - f4 fd 2a 01 00 00 00 00 ...w......*.....

00000000012afde0 ff ff ff ff 01 00 00 00 - d0 a0 0c 00 08 00 00 00 ................

00000000012afdf0 00 00 00 00 70 02 00 00 - 0c 07 00 00 c4 04 00 00 ....p...........

00000000012afe00 08 04 00 00 88 03 00 00 - 28 02 00 00 24 02 00 00 ........(...$...

00000000012afe10 0c 02 00 00 00 02 00 00 - 00 00 00 00 01 00 00 00 ................

00000000012afe20 00 60 fd 7f 00 02 00 00 - 4c ff 2a 01 1f 4e a0 7c .`......L.*..N.|

00000000012afe30 08 00 00 00 50 fe 2a 01 - ff ff ff ff ff 04 00 00 ....P.*.........

00000000012afe40 f4 fd 2a 01 00 00 00 00 - 00 00 00 00 00 00 00 00 ..*.............

00000000012afe50 70 02 00 00 0c 07 00 00 - c4 04 00 00 08 04 00 00 p...............

00000000012afe60 88 03 00 00 28 02 00 00 - 24 02 00 00 0c 02 00 00 ....(...$.......

 

*----> Statusabbild für Threadkennung 0x170 <----*

 

eax=00ddf86c ebx=00004e20 ecx=00ddf7f8 edx=7c91eb94 esi=00ddfd68 edi=77d191c6

eip=7c91eb94 esp=00ddfcf8 ebp=00ddfd14 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\stobject.dll -

WARNING: Stack unwind information not available. Following frames may be wrong.

ChildEBP RetAddr Args to Child

00ddfd14 765c1513 00ddfd68 00000000 00000000 ntdll!KiFastSystemCallRet

00ddfd8c 765c3746 765c0000 00000000 000701ea stobject+0x1513

00ddffb4 7c80b50b 00000000 00000000 00000000 stobject!DllCanUnloadNow+0x1fa4

00ddffec 00000000 765c36f7 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

0000000000ddfcf8 be 91 d1 77 f1 91 d1 77 - 68 fd dd 00 00 00 00 00 ...w...wh.......

0000000000ddfd08 00 00 00 00 00 00 00 00 - 00 00 00 00 8c fd dd 00 ................

0000000000ddfd18 13 15 5c 76 68 fd dd 00 - 00 00 00 00 00 00 00 00 ..\vh...........

0000000000ddfd28 00 00 00 00 00 00 00 00 - 00 00 5c 76 00 00 00 00 ..........\v....

0000000000ddfd38 30 00 00 00 00 40 00 00 - 21 13 5c 76 00 00 00 00 0....@..!.\v....

0000000000ddfd48 1e 00 00 00 00 00 5c 76 - d1 00 11 00 11 00 01 00 ......\v........

0000000000ddfd58 10 00 00 00 00 00 00 00 - f4 31 5c 76 00 00 00 00 .........1\v....

0000000000ddfd68 f2 01 02 00 05 04 00 00 - 00 00 00 00 c1 00 00 00 ................

0000000000ddfd78 74 e6 af 00 d3 02 00 00 - d6 01 00 00 00 00 00 00 t...............

0000000000ddfd88 00 00 00 00 b4 ff dd 00 - 46 37 5c 76 00 00 5c 76 ........F7\v..\v

0000000000ddfd98 00 00 00 00 ea 01 07 00 - 01 00 00 00 00 00 00 00 ................

0000000000ddfda8 43 00 3a 00 5c 00 57 00 - 49 00 4e 00 44 00 4f 00 C.:.\.W.I.N.D.O.

0000000000ddfdb8 57 00 53 00 5c 00 73 00 - 79 00 73 00 74 00 65 00 W.S.\.s.y.s.t.e.

0000000000ddfdc8 6d 00 33 00 32 00 5c 00 - 73 00 74 00 6f 00 62 00 m.3.2.\.s.t.o.b.

0000000000ddfdd8 6a 00 65 00 63 00 74 00 - 2e 00 64 00 6c 00 6c 00 j.e.c.t...d.l.l.

0000000000ddfde8 00 00 81 7c 1b 00 00 00 - 00 02 00 00 fc ff dd 00 ...|............

0000000000ddfdf8 23 00 00 00 8c 26 00 e1 - 01 00 00 00 32 07 92 01 #....&......2...

0000000000ddfe08 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000000ddfe18 00 00 00 00 ff ff ff ff - 00 00 00 00 ff 03 1f 00 ................

0000000000ddfe28 00 00 00 00 8d 5b f6 f2 - 68 ec 0d 86 08 31 7c 86 .....[..h....1|.

 

*----> Statusabbild für Threadkennung 0x624 <----*

 

eax=72c930e8 ebx=00f2fef8 ecx=00000015 edx=00000000 esi=00000000 edi=7ffde000

eip=7c91eb94 esp=00f2fed0 ebp=00f2ff6c iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

WARNING: Stack unwind information not available. Following frames may be wrong.

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv -

ChildEBP RetAddr Args to Child

00f2ff6c 7c809c86 00000002 00f2ffa4 00000000 ntdll!KiFastSystemCallRet

00f2ff88 72c9312a 00000002 00f2ffa4 00000000 kernel32!WaitForMultipleObjects+0x18

00f2ffb4 7c80b50b 00000000 00000000 00090000 wdmaud!midMessage+0x348

00f2ffec 00000000 72c930e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

0000000000f2fed0 ab e9 91 7c f2 94 80 7c - 02 00 00 00 f8 fe f2 00 ...|...|........

0000000000f2fee0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000000f2fef0 00 00 00 00 00 00 00 00 - ac 04 00 00 98 04 00 00 ................

0000000000f2ff00 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000000f2ff10 00 00 00 00 00 00 00 00 - 14 00 00 00 01 00 00 00 ................

0000000000f2ff20 d0 01 11 02 00 00 00 00 - 00 00 00 00 18 3b 13 86 .............;..

0000000000f2ff30 4c 3b 13 86 00 00 00 00 - 00 e0 fd 7f 00 b0 fa 7f L;..............

0000000000f2ff40 18 3b 13 86 00 00 00 00 - f8 fe f2 00 3c b9 4f 80 .;..........<.O.

0000000000f2ff50 02 00 00 00 ec fe f2 00 - 00 00 00 00 dc ff f2 00 ................

0000000000f2ff60 f3 99 83 7c 90 95 80 7c - 00 00 00 00 88 ff f2 00 ...|...|........

0000000000f2ff70 86 9c 80 7c 02 00 00 00 - a4 ff f2 00 00 00 00 00 ...|............

0000000000f2ff80 ff ff ff ff 00 00 00 00 - b4 ff f2 00 2a 31 c9 72 ............*1.r

0000000000f2ff90 02 00 00 00 a4 ff f2 00 - 00 00 00 00 ff ff ff ff ................

0000000000f2ffa0 00 00 09 00 ac 04 00 00 - 98 04 00 00 f2 0e 70 80 ..............p.

0000000000f2ffb0 dc e2 91 7c ec ff f2 00 - 0b b5 80 7c 00 00 00 00 ...|.......|....

0000000000f2ffc0 00 00 00 00 00 00 09 00 - 00 00 00 00 00 b0 fa 7f ................

0000000000f2ffd0 00 e6 7b 86 c0 ff f2 00 - d8 e3 75 86 ff ff ff ff ..{.......u.....

0000000000f2ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........

0000000000f2fff0 00 00 00 00 e8 30 c9 72 - 00 00 00 00 00 00 00 00 .....0.r........

0000000000f30000 4d 5a 90 00 03 00 00 00 - 04 00 00 00 ff ff 00 00 MZ..............

 

*----> Statusabbild für Threadkennung 0xcb4 <----*

 

eax=00000167 ebx=0207fb6c ecx=02c8e190 edx=0207fc3c esi=00000000 edi=7ffde000

eip=7c91eb94 esp=0207fb44 ebp=0207fbe0 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=1f80 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

WARNING: Stack unwind information not available. Following frames may be wrong.

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\DUSER.dll -

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\BROWSEUI.dll -

ChildEBP RetAddr Args to Child

0207fbe0 77d195f9 00000002 0207fc08 00000000 ntdll!KiFastSystemCallRet

0207fc3c 6c6a4b92 00000001 0207fc70 ffffffff USER32!GetLastInputInfo+0x105

0207fc5c 6c6a4cfd 000024ff ffffffff 00000000 DUSER+0x34b92

0207fc80 6c6a4ef9 000024ff 00000000 0207fcac DUSER+0x34cfd

0207fc90 77d589eb 000024ff 00000000 00000064 DUSER+0x34ef9

0207fcac 7c91eae3 0207fcbc 00000008 000024ff USER32!DdeConnectList+0x955

0207ff20 75f4e805 00117150 00000000 00000000 ntdll!KiUserCallbackDispatcher+0x13

0207ffb4 7c80b50b 00117150 00000000 00000000 BROWSEUI!Ordinal107+0xbf1e

0207ffec 00000000 75f4e7b5 00117150 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

000000000207fb44 ab e9 91 7c f2 94 80 7c - 02 00 00 00 6c fb 07 02 ...|...|....l...

000000000207fb54 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000207fb64 02 00 00 00 00 00 00 00 - 80 06 00 00 18 02 00 00 ................

000000000207fb74 01 00 00 00 78 08 12 02 - a0 5e 09 00 00 00 00 00 ....x....^......

000000000207fb84 00 00 00 00 38 02 00 00 - 14 00 00 00 01 00 00 00 ....8...........

000000000207fb94 00 00 00 00 00 00 00 00 - 10 00 00 00 f4 fb 07 02 ................

000000000207fba4 67 04 d4 77 30 88 d1 77 - 00 e0 fd 7f 00 40 fd 7f g..w0..w.....@..

000000000207fbb4 c0 b4 d1 77 00 00 00 00 - 6c fb 07 02 96 03 04 00 ...w....l.......

000000000207fbc4 02 00 00 00 60 fb 07 02 - 00 00 00 00 a4 ff 07 02 ....`...........

000000000207fbd4 f3 99 83 7c 90 95 80 7c - 00 00 00 00 3c fc 07 02 ...|...|....<...

000000000207fbe4 f9 95 d1 77 02 00 00 00 - 08 fc 07 02 00 00 00 00 ...w............

000000000207fbf4 ff ff ff ff 00 00 00 00 - ff ff ff ff 01 00 00 00 ................

000000000207fc04 ac 92 80 7c 80 06 00 00 - 18 02 00 00 8e 72 6a 6c ...|.........rjl

000000000207fc14 ff ff ff ff a9 72 6a 6c - 62 dc af 00 f0 f5 12 02 .....rjlb.......

000000000207fc24 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

000000000207fc34 00 40 fd 7f 18 02 00 00 - 5c fc 07 02 92 4b 6a 6c .@......\....Kjl

000000000207fc44 01 00 00 00 70 fc 07 02 - ff ff ff ff ff 24 00 00 ....p........$..

000000000207fc54 08 fc 07 02 18 d9 18 00 - 80 fc 07 02 fd 4c 6a 6c .............Ljl

000000000207fc64 ff 24 00 00 ff ff ff ff - 00 00 00 00 80 06 00 00 .$..............

000000000207fc74 00 00 00 00 90 1e 09 00 - 00 00 00 00 90 fc 07 02 ................

 

*----> Statusabbild für Threadkennung 0xc9c <----*

 

eax=00000000 ebx=02b7fde8 ecx=02125c38 edx=000044d1 esi=00000000 edi=7ffde000

eip=7c91eb94 esp=02b7fdc0 ebp=02b7fe5c iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

WARNING: Stack unwind information not available. Following frames may be wrong.

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\msvcrt.dll -

ChildEBP RetAddr Args to Child

02b7fe5c 77d195f9 00000002 02b7fe84 00000000 ntdll!KiFastSystemCallRet

02b7feb8 6c6a4b92 00000001 02b7feec ffffffff USER32!GetLastInputInfo+0x105

02b7fed8 6c6a4ddc 000004ff ffffffff 00000001 DUSER+0x34b92

02b7ff0c 6c69e394 02b7ff4c 00000000 00000000 DUSER+0x34ddc

02b7ff2c 6c69a6f1 02b7ff4c 00000000 00000000 DUSER!GetMessageExA+0x44

02b7ff80 77c0a3b0 00000000 7c920000 7c9231dc DUSER!DUserStopAnimation+0xa505

02b7ffb4 7c80b50b 000384a0 7c920000 7c9231dc msvcrt!endthreadex+0xa9

02b7ffec 00000000 77c0a341 000384a0 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

0000000002b7fdc0 ab e9 91 7c f2 94 80 7c - 02 00 00 00 e8 fd b7 02 ...|...|........

0000000002b7fdd0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000002b7fde0 02 00 00 00 04 00 00 00 - 08 06 00 00 8c 05 00 00 ................

0000000002b7fdf0 68 00 3f 02 60 07 bb 02 - 02 00 00 00 0c 20 be 02 h.?.`........ ..

0000000002b7fe00 00 00 3f 02 0c 00 00 00 - 14 00 00 00 01 00 00 00 ..?.............

0000000002b7fe10 00 00 00 00 00 00 00 00 - 10 00 00 00 0a 18 6a 6c ..............jl

0000000002b7fe20 0c 00 00 00 00 00 00 00 - 00 e0 fd 7f 00 f0 fa 7f ................

0000000002b7fe30 02 00 00 00 00 00 00 00 - e8 fd b7 02 2c fe b7 02 ............,...

0000000002b7fe40 02 00 00 00 dc fd b7 02 - e6 1f 6a 6c a4 ff b7 02 ..........jl....

0000000002b7fe50 f3 99 83 7c 90 95 80 7c - 00 00 00 00 b8 fe b7 02 ...|...|........

0000000002b7fe60 f9 95 d1 77 02 00 00 00 - 84 fe b7 02 00 00 00 00 ...w............

0000000002b7fe70 ff ff ff ff 00 00 00 00 - 90 d2 16 00 01 00 00 00 ................

0000000002b7fe80 4c ff b7 02 08 06 00 00 - 8c 05 00 00 8e 72 6a 6c L............rjl

0000000002b7fe90 ff ff ff ff a9 72 6a 6c - 20 d1 44 00 30 5c 12 02 .....rjl .D.0\..

0000000002b7fea0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000002b7feb0 00 f0 fa 7f 8c 05 00 00 - d8 fe b7 02 92 4b 6a 6c .............Kjl

0000000002b7fec0 01 00 00 00 ec fe b7 02 - ff ff ff ff ff 04 00 00 ................

0000000002b7fed0 84 fe b7 02 ff ff ff ff - 0c ff b7 02 dc 4d 6a 6c .............Mjl

0000000002b7fee0 ff 04 00 00 ff ff ff ff - 01 00 00 00 08 06 00 00 ................

0000000002b7fef0 00 00 00 00 00 00 00 00 - a0 84 03 00 01 00 00 00 ................

 

*----> Statusabbild für Threadkennung 0xcfc <----*

 

eax=00940028 ebx=00000570 ecx=00000007 edx=00090608 esi=02eaff98 edi=77d21042

eip=7c91eb94 esp=02eaff54 ebp=02eaff78 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WINMM.dll -

WARNING: Stack unwind information not available. Following frames may be wrong.

ChildEBP RetAddr Args to Child

02eaff78 76af4e3d 02eaff98 00000000 00000000 ntdll!KiFastSystemCallRet

02eaffb4 7c80b50b 00000570 00000200 0000002b WINMM!PlaySoundW+0x7e6

02eaffec 00000000 76af4dd6 00000570 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

0000000002eaff54 be 91 d1 77 82 10 d2 77 - 98 ff ea 02 00 00 00 00 ...w...w........

0000000002eaff64 00 00 00 00 00 00 00 00 - 70 05 00 00 42 10 d2 77 ........p...B..w

0000000002eaff74 00 00 00 00 b4 ff ea 02 - 3d 4e af 76 98 ff ea 02 ........=N.v....

0000000002eaff84 00 00 00 00 00 00 00 00 - 00 00 00 00 00 02 00 00 ................

0000000002eaff94 2b 00 00 00 fc 02 02 00 - bc 03 00 00 50 dc 0c 00 +...........P...

0000000002eaffa4 00 00 00 00 a8 d3 af 00 - 04 01 00 00 b9 02 00 00 ................

0000000002eaffb4 ec ff ea 02 0b b5 80 7c - 70 05 00 00 00 02 00 00 .......|p.......

0000000002eaffc4 2b 00 00 00 70 05 00 00 - 00 70 fa 7f 00 c6 7b 86 +...p....p....{.

0000000002eaffd4 c0 ff ea 02 48 62 6c 86 - ff ff ff ff f3 99 83 7c ....Hbl........|

0000000002eaffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............

0000000002eafff4 d6 4d af 76 70 05 00 00 - 00 00 00 00 00 00 00 00 .M.vp...........

0000000002eb0004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000002eb0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000002eb0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000002eb0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000002eb0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000002eb0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000002eb0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000002eb0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

0000000002eb0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

 

*----> Statusabbild für Threadkennung 0x3dc <----*

 

eax=00000000 ebx=00000000 ecx=7ffdc000 edx=000b839c esi=000b8360 edi=000b8404

eip=7c91eb94 esp=014afe1c ebp=014aff80 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -

WARNING: Stack unwind information not available. Following frames may be wrong.

ChildEBP RetAddr Args to Child

014aff80 77e56c22 014affa8 77e56a3b 000b8360 ntdll!KiFastSystemCallRet

014aff88 77e56a3b 000b8360 00000000 02eefc98 RPCRT4!I_RpcBCacheFree+0x5ea

014affa8 77e56c0a 000b8218 014affec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403

014affb4 7c80b50b 000f4eb8 00000000 02eefc98 RPCRT4!I_RpcBCacheFree+0x5d2

014affec 00000000 77e56bf0 000f4eb8 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

00000000014afe1c 99 e3 91 7c 03 67 e5 77 - 90 01 00 00 70 ff 4a 01 ...|.g.w....p.J.

00000000014afe2c 00 00 00 00 f8 31 0c 00 - 4c ff 4a 01 ff ff ff ff .....1..L.J.....

00000000014afe3c e4 cb dd f2 ff ff ff ff - ff ff ff ff ec cb dd f2 ................

00000000014afe4c 50 f9 1d 86 02 ca dd f2 - 00 00 dd f2 06 02 00 00 P...............

00000000014afe5c 25 9e 4d 80 02 00 00 00 - 02 00 00 00 20 40 fd 85 %.M......... @..

00000000014afe6c df 00 00 00 20 40 fd 85 - 28 48 2d 86 40 f5 ab f7 .... @..(H-.@...

00000000014afe7c 0d ca 4d 80 ff ff ff ff - 02 02 00 00 09 c9 4d 80 ..M...........M.

00000000014afe8c 90 cb dd f2 fa 03 70 80 - 20 40 fd 85 63 0f 70 80 ......p. @..c.p.

00000000014afe9c 00 00 00 00 43 0d 70 80 - 28 cc dd f2 27 04 70 80 ....C.p.(...'.p.

00000000014afeac 00 0d db ba 00 00 00 00 - fa 03 70 80 00 0d db ba ..........p.....

00000000014afebc 00 00 00 00 00 0d db ba - 00 00 00 00 c1 09 14 00 ................

00000000014afecc a9 44 02 00 58 41 01 00 - e0 9d 09 00 78 a1 03 00 .D..XA......x...

00000000014afedc 9a 40 0e 00 00 00 00 00 - 00 00 00 00 00 00 00 00 .@..............

00000000014afeec 00 00 00 00 ff ff ff ff - 40 f5 df ff 00 00 00 00 ........@.......

00000000014afefc 10 04 70 80 bc 41 fd 85 - 28 cc dd f2 00 00 00 00 ..p..A..(.......

00000000014aff0c 27 04 70 80 08 00 00 00 - 46 02 00 00 e8 1b 4e 80 '.p.....F.....N.

00000000014aff1c 90 40 fd 85 20 40 fd 85 - 1e 1c 4e 80 8c 41 fd 85 .@.. @....N..A..

00000000014aff2c 20 40 fd 85 80 ff 4a 01 - 99 66 e5 77 4c ff 4a 01 @....J..f.wL.J.

00000000014aff3c a9 66 e5 77 ed 10 91 7c - 00 79 0e 00 b8 4e 0f 00 .f.w...|.y...N..

00000000014aff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

 

*----> Statusabbild für Threadkennung 0x99c <----*

 

eax=016dfd08 ebx=021a2138 ecx=71a8cae7 edx=71a8f038 esi=00000000 edi=0041005c

eip=598090dc esp=016dfca8 ebp=016dfd18 iopl=0 nv up ei pl nz na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

 

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\NETAPI32.dll -

Funktion: NETAPI32!NetDfsGetClientInfo

598090bf 90 nop

598090c0 90 nop

NETAPI32!NetDfsGetClientInfo:

598090c1 6a54 push 0x54

598090c3 6800948059 push 0x59809400

598090c8 e863abfcff call NETAPI32!NetpNtStatusToApiStatus+0x20 (597d3c30)

598090cd 8365d800 and dword ptr [ebp-0x28],0x0

598090d1 8b7d08 mov edi,[ebp+0x8]

598090d4 85ff test edi,edi

598090d6 0f8417030000 je NETAPI32!NetDfsGetClientInfo+0x332 (598093f3)

FEHLER ->598090dc 66833f00 cmp word ptr [edi],0x0 ds:0023:0041005c=????

598090e0 0f840d030000 je NETAPI32!NetDfsGetClientInfo+0x332 (598093f3)

598090e6 837d1401 cmp dword ptr [ebp+0x14],0x1

598090ea 0f82ff020000 jb NETAPI32!NetDfsGetClientInfo+0x32e (598093ef)

598090f0 837d1404 cmp dword ptr [ebp+0x14],0x4

598090f4 0f87f5020000 jnbe NETAPI32!NetDfsGetClientInfo+0x32e (598093ef)

598090fa 57 push edi

598090fb 8b35a0107d59 mov esi,[NETAPI32+0x10a0 (597d10a0)]

59809101 ffd6 call esi

59809103 59 pop ecx

59809104 83f802 cmp eax,0x2

 

*----> Stack Back Trace <----*

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\twext.dll -

WARNING: Stack unwind information not available. Following frames may be wrong.

ChildEBP RetAddr Args to Child

016dfd18 59d42912 0041005c 00000000 00000000 NETAPI32!NetDfsGetClientInfo+0x1b

016dfd3c 59d429b9 0041005c 016dfe20 021a213c twext+0x2912

016dfd58 59d42a0c 00000226 021a2230 016dfd7c twext+0x29b9

016dfd68 59d45a77 021a2138 00000000 021a2138 twext+0x2a0c

016dfd7c 59d45e1d 00000000 00000000 00000000 twext+0x5a77

016dfda0 7caa2000 02138cb8 021a2230 00000001 twext+0x5e1d

016dfdec 7cab2341 02138cb8 02138cb0 00000001 SHELL32!Ordinal751+0x945

016dfe0c 7cab0588 021990f8 00000000 00000001 SHELL32!Ordinal744+0x165f

016dfe30 7cab06ac 7ca6e3e0 021990f8 00000000 SHELL32!CDefFolderMenu_Create2+0x7956

016dfe4c 7cb38b58 0217edc8 00000000 00000001 SHELL32!CDefFolderMenu_Create2+0x7a7a

016dfe68 7cad0923 00000002 016dfe84 7cb90235 SHELL32!CallCPLEntry16+0x4f06

016dfe74 7cb90235 000e30f0 000b2c10 016dfee0 SHELL32!Ordinal205+0x5557

016dfe84 75f32a34 000e30f0 75f21b18 75f20000 SHELL32!Ordinal715+0x23ce2

016dfee0 77f49498 00105ad0 00123830 77f4947b BROWSEUI!DllCanUnloadNow+0x8843

016dfef8 7c937545 00123830 7c98c3a0 00147c08 SHLWAPI!Ordinal120+0xbf

016dff40 7c937583 77f4947b 00123830 00000000 ntdll!RtlUpcaseUnicodeString+0x159

016dff60 7c937645 00000000 00123830 00147c08 ntdll!RtlUpcaseUnicodeString+0x197

016dff74 7c93761c 7c937569 00000000 00123830 ntdll!RtlUpcaseUnicodeString+0x259

016dffb4 7c80b50b 00000000 0207dedc 0207dedc ntdll!RtlUpcaseUnicodeString+0x230

016dffec 00000000 7c920760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

00000000016dfca8 5c 00 41 00 00 00 00 00 - 38 21 1a 02 d8 fc 6d 01 \.A.....8!....m.

00000000016dfcb8 00 00 00 00 20 f8 0d 00 - 32 dc 95 7c ee db 95 7c .... ...2..|...|

00000000016dfcc8 30 02 00 00 1d 00 00 00 - 00 00 09 00 cc fa 6d 01 0.............m.

00000000016dfcd8 44 00 00 00 28 fd 6d 01 - 04 00 00 00 38 21 1a 02 D...(.m.....8!..

00000000016dfce8 ff ff ff ff 20 f8 0d 00 - 00 00 00 00 00 00 00 00 .... ...........

00000000016dfcf8 68 fc 6d 01 2c f8 0d 00 - a8 fc 6d 01 cc f8 6d 01 h.m.,.....m...m.

00000000016dfd08 30 ff 6d 01 e1 bf 7d 59 - 00 94 80 59 ff ff ff ff 0.m...}Y...Y....

00000000016dfd18 3c fd 6d 01 12 29 d4 59 - 5c 00 41 00 00 00 00 00 <.m..).Y\.A.....

00000000016dfd28 00 00 00 00 01 00 00 00 - 44 fd 6d 01 bd 99 80 7c ........D.m....|

00000000016dfd38 20 f8 0d 00 58 fd 6d 01 - b9 29 d4 59 5c 00 41 00 ...X.m..).Y\.A.

00000000016dfd48 20 fe 6d 01 3c 21 1a 02 - 00 00 00 00 00 00 00 00 .m.<!..........

00000000016dfd58 68 fd 6d 01 0c 2a d4 59 - 26 02 00 00 30 22 1a 02 h.m..*.Y&...0"..

00000000016dfd68 7c fd 6d 01 77 5a d4 59 - 38 21 1a 02 00 00 00 00 |.m.wZ.Y8!......

00000000016dfd78 38 21 1a 02 a0 fd 6d 01 - 1d 5e d4 59 00 00 00 00 8!....m..^.Y....

00000000016dfd88 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

00000000016dfd98 ac 18 d4 59 ac 18 d4 59 - ec fd 6d 01 00 20 aa 7c ...Y...Y..m.. .|

00000000016dfda8 b8 8c 13 02 30 22 1a 02 - 01 00 00 00 00 00 00 00 ....0"..........

00000000016dfdb8 58 86 0e 00 70 fe 6d 01 - 1c fd 6d 01 18 ee 91 7c X...p.m...m....|

00000000016dfdc8 10 fe 6d 01 18 ee 91 7c - 28 00 00 00 00 00 09 00 ..m....|(.......

00000000016dfdd8 00 00 00 00 00 50 fd 7f - 40 fe 6d 01 00 00 00 20 .....P..@.m....

 

*----> Statusabbild für Threadkennung 0x818 <----*

 

eax=00000102 ebx=00000000 ecx=014efe1c edx=7c91eb94 esi=000b8360 edi=000b8404

eip=7c91eb94 esp=014efe1c ebp=014eff80 iopl=0 nv up ei pl zr na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

 

Funktion: ntdll!KiFastSystemCallRet

7c91eb89 90 nop

7c91eb8a 90 nop

ntdll!KiFastSystemCall:

7c91eb8b 8bd4 mov edx,esp

7c91eb8d 0f34 sysenter

7c91eb8f 90 nop

7c91eb90 90 nop

7c91eb91 90 nop

7c91eb92 90 nop

7c91eb93 90 nop

ntdll!KiFastSystemCallRet:

7c91eb94 c3 ret

7c91eb95 8da42400000000 lea esp,[esp]

7c91eb9c 8d642400 lea esp,[esp]

7c91eba0 90 nop

7c91eba1 90 nop

7c91eba2 90 nop

7c91eba3 90 nop

7c91eba4 90 nop

ntdll!KiIntSystemCall:

7c91eba5 8d542408 lea edx,[esp+0x8]

7c91eba9 cd2e int 2e

 

*----> Stack Back Trace <----*

WARNING: Stack unwind information not available. Following frames may be wrong.

ChildEBP RetAddr Args to Child

014eff80 77e56c22 014effa8 77e56a3b 000b8360 ntdll!KiFastSystemCallRet

014eff88 77e56a3b 000b8360 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5ea

014effa8 77e56c0a 000b8218 014effec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403

014effb4 7c80b50b 021b2008 00000000 00000000 RPCRT4!I_RpcBCacheFree+0x5d2

014effec 00000000 77e56bf0 021b2008 00000000 kernel32!GetModuleFileNameA+0x1b4

 

*----> Raw Stack Dump <----*

00000000014efe1c 99 e3 91 7c 03 67 e5 77 - 90 01 00 00 70 ff 4e 01 ...|.g.w....p.N.

00000000014efe2c 00 00 00 00 a8 fb 0c 00 - 4c ff 4e 01 30 0b 4d f5 ........L.N.0.M.

00000000014efe3c 58 9a 3a e1 05 c6 4d 80 - b8 0b 4d f5 9c 0b 4d f5 X.:...M...M...M.

00000000014efe4c 58 9a 3a e1 02 0b 4d f5 - 00 00 3a e1 48 0b 4d f5 X.:...M...:.H.M.

00000000014efe5c a7 b2 56 80 58 9a 3a e1 - 01 00 00 00 74 0b 4d f5 ..V.X.:.....t.M.

00000000014efe6c 0c 00 00 00 58 9a 3a e1 - 00 00 00 00 9c 0b 4d f5 ....X.:.......M.

00000000014efe7c f4 0c 4d f5 9c 0b 4d f5 - b8 0b 4d f5 06 02 00 00 ..M...M...M.....

00000000014efe8c 9e 9d 4d 80 2e 25 4e 80 - 48 5a f8 85 28 0c 4d f5 ..M..%N.HZ..(.M.

00000000014efe9c 00 01 70 80 90 0b 4d f5 - 06 01 70 80 1c 00 00 00 ..p...M...p.....

00000000014efeac e1 00 00 00 28 0c 4d f5 - 2e 25 4e 80 00 0d db ba ....(.M..%N.....

00000000014efebc 81 88 55 80 68 0d 50 86 - a8 5d 6f 86 c0 1e 56 80 ..U.h.P..]o...V.

00000000014efecc 86 9a 4e 80 00 0b 4d f5 - 80 0d 50 86 00 00 00 00 ..N...M...P.....

00000000014efedc 00 00 00 00 20 00 00 00 - 08 20 71 e2 00 00 00 00 .... .... q.....<br

bearbeitet von karlk
Link zu diesem Kommentar
Auf anderen Seiten teilen

Hallo,

 

könnt Ihr mit dem etwas Anfangen?

 

 

Microsoft ® Windows Debugger Version 6.6.0003.5

Copyright © Microsoft Corporation. All rights reserved.

 

 

Loading Dump File [C:\tmp\DR Watson\user.dmp]

User Mini Dump File: Only registers, stack and portions of memory are available

 

Comment: 'Dr. Watson generated MiniDump'

Windows XP Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible

Product: WinNt, suite: SingleUserTS

Debug session time: Wed Mar 15 10:40:40.000 2006 (GMT+1)

System Uptime: not available

Process Uptime: 0 days 1:58:35.000

Symbol search path is: *** Invalid ***

****************************************************************************

* Symbol loading may be unreliable without a symbol search path. *

* Use .symfix to have the debugger choose a symbol path. *

* After setting your symbol path, use .reload to refresh symbol locations. *

****************************************************************************

Executable search path is:

................................................................................

........................................................

This dump file has an exception of interest stored in it.

The stored exception information can be accessed via .ecxr.

(fb0.99c): Access violation - code c0000005 (first/second chance not available)

eax=016dfd08 ebx=021a2138 ecx=71a8cae7 edx=71a8f038 esi=00000000 edi=0041005c

eip=598090dc esp=016dfca8 ebp=016dfd18 iopl=0 nv up ei pl nz na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

*** ERROR: Symbol file could not be found. Defaulted to export symbols for netapi32.dll -

netapi32!NetDfsGetClientInfo+0x1b:

598090dc 66833f00 cmp word ptr [edi],0x0 ds:0023:0041005c=????

 

 

 

Danke.

 

cu

karlk

Link zu diesem Kommentar
Auf anderen Seiten teilen

Ich habe das auch ab und zu und konnte bei mir als Ursache die Datei nerodigitalex.dll festmachen. Naja, muss wohl daran liegen, weil mir mein Originalnero irgendwie hinter den Schreibtisch gefallen ist... ;)

Link zu diesem Kommentar
Auf anderen Seiten teilen

Wenn Fehlermeldung für falsche CD erscheint:

 

1. Ausführen: "regedit"

2. Bis zum Schlüssel HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Setup

durchhangeln

3. dort jeweils die beiden Schlüssel "ServicePackSourcePath" und "SourcePath" auf den Laufwerksbuchstaben der eingelegten Windows-CD anpassen (z.B. D:).

4. Neustart

5. Ausführen: "sfc /scannow".

Nun sollte alles ohne Nachfrage nach der falschen CD funktionieren.

Kann passieren wenn System CD inkl. SVPI/II verlangt!

 

Einfach mal probieren!

Link zu diesem Kommentar
Auf anderen Seiten teilen

Hallo,

 

habe ich gemacht,

 

Dann war einige Tage Ruhe und nun dies....

 

 

Microsoft ® Windows Debugger Version 6.6.0003.5

Copyright © Microsoft Corporation. All rights reserved.

 

 

Loading Dump File [C:\tmp\DR Watson\user.dmp]

User Mini Dump File: Only registers, stack and portions of memory are available

 

Comment: 'Dr. Watson generated MiniDump'

Windows XP Version 2600 (Service Pack 2) MP (2 procs) Free x86 compatible

Product: WinNt, suite: SingleUserTS

Debug session time: Tue Mar 21 09:36:04.000 2006 (GMT+1)

System Uptime: not available

Process Uptime: 0 days 1:58:50.000

Symbol search path is: *** Invalid ***

****************************************************************************

* Symbol loading may be unreliable without a symbol search path. *

* Use .symfix to have the debugger choose a symbol path. *

* After setting your symbol path, use .reload to refresh symbol locations. *

****************************************************************************

Executable search path is:

................................................................................

.............................................................

This dump file has an exception of interest stored in it.

The stored exception information can be accessed via .ecxr.

(1a0.e40): Access violation - code c0000005 (first/second chance not available)

eax=0366fd08 ebx=02217c00 ecx=71a8cae7 edx=71a8f038 esi=00000000 edi=0041005c

eip=598090dc esp=0366fca8 ebp=0366fd18 iopl=0 nv up ei pl nz na po nc

cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206

*** ERROR: Symbol file could not be found. Defaulted to export symbols for netapi32.dll -

netapi32!NetDfsGetClientInfo+0x1b:

598090dc 66833f00 cmp word ptr [edi],0x0 ds:0023:0041005c=????

 

 

 

 

Was kann das denn nur sein???????

 

HILFE

 

Danke

 

cu

karlk

Link zu diesem Kommentar
Auf anderen Seiten teilen

  • Wer ist Online   0 Benutzer

    • Keine registrierten Benutzer online.
×
×
  • Neu erstellen...