Windows critical error

Status
Not open for further replies.

icemagic

Baseband Member
Messages
51
Out of the blue at random times my pc just stops and restarts. I dont know why it does this, and when windows loads a message comes up and says a windows has just recovered from a seriouse error would you like to send error report.


How do i fix this problem?
 
turn off windows error reporting....and check then dr.watson log and post it here and also check the event viewer
 
Press the Windows key + Pause at the same time (bring up System Information)

Click the Advanced tab
Click the "Startup and Recovery" settings
Uncheck "automatically restart"
 
Microsoft (R) DrWtsn32
Copyright (C) 1985-2001 Microsoft Corp. All rights reserved.



Application exception occurred:
App: C:\Program Files\MSN Messenger\MsnMsgr.Exe (pid=1940)
When: 2/05/2006 @ 17:15:49.609
Exception number: c0000005 (access violation)

*----> System Information <----*
Computer Name: LEE
User Name: Leecs
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 15 Model 47 Stepping 2
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: Lee

*----> Task List <----*
0 System Process
4 System
424 smss.exe
696 csrss.exe
720 winlogon.exe
768 services.exe
780 lsass.exe
952 svchost.exe
1000 svchost.exe
1108 svchost.exe
1180 svchost.exe
1296 svchost.exe
1508 spoolsv.exe
1648 nvsvc32.exe
1720 svchost.exe
1788 Error 0xD0000022
676 alg.exe
1876 Explorer.EXE
644 jusched.exe
1100 Error 0xD0000022
1152 realsched.exe
1940 MsnMsgr.Exe
2388 mantispm.exe
2484 BitComet.exe
2964 LimeWire.exe
2680 drwtsn32.exe

*----> Module List <----*
(0000000000270000 - 000000000030e000: C:\Program Files\MSN Messenger\msidcrl.dll
(0000000000400000 - 0000000000adc000: C:\Program Files\MSN Messenger\MsnMsgr.Exe
(00000000019e0000 - 0000000001aa3000: C:\WINDOWS\system32\LIBEAY32_0.9.6l.dll
(0000000001d30000 - 0000000001d3f000: C:\WINDOWS\system32\ZoneLabs\vetredir.dll
(0000000001df0000 - 0000000001e05000: C:\WINDOWS\system32\ZoneLabs\isafeif.dll
(0000000002800000 - 00000000028d1000: C:\WINDOWS\system32\ZoneLabs\dbghelp.dll
(0000000003c80000 - 0000000003d08000: C:\WINDOWS\System32\shdoclc.dll
(0000000003d10000 - 0000000003d37000: C:\WINDOWS\System32\msls31.dll
(000000000ffd0000 - 000000000fff8000: C:\WINDOWS\system32\rsaenh.dll
(0000000010000000 - 00000000102b0000: C:\WINDOWS\system32\imslsp.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(0000000022000000 - 0000000022007000: C:\PROGRA~1\ZONELA~1\ZONEAL~1\MAILFR~1\mlfhook.dll
(000000004d4f0000 - 000000004d548000: C:\WINDOWS\system32\WINHTTP.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\uxtheme.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(00000000662b0000 - 0000000066308000: C:\WINDOWS\system32\hnetcfg.dll
(0000000068100000 - 0000000068124000: C:\WINDOWS\system32\dssenh.dll
(0000000069200000 - 0000000069392000: C:\Program Files\MSN Messenger\MSGSLANG.DLL
(000000006d430000 - 000000006d43a000: C:\WINDOWS\System32\ddrawex.dll
(0000000071a50000 - 0000000071a8f000: C:\WINDOWS\System32\mswsock.dll
(0000000071a90000 - 0000000071a98000: C:\WINDOWS\System32\wshtcpip.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\wsock32.dll
(00000000722b0000 - 00000000722b5000: C:\WINDOWS\system32\SensApi.dll
(0000000072d10000 - 0000000072d18000: C:\WINDOWS\system32\msacm32.drv
(0000000072d20000 - 0000000072d29000: C:\WINDOWS\system32\wdmaud.drv
(00000000736b0000 - 00000000736b7000: C:\WINDOWS\system32\msdmo.dll
(0000000073760000 - 00000000737a9000: C:\WINDOWS\System32\DDRAW.dll
(0000000073bc0000 - 0000000073bc6000: C:\WINDOWS\System32\DCIMAN32.dll
(0000000073f10000 - 0000000073f6c000: C:\WINDOWS\system32\DSOUND.dll
(00000000745e0000 - 00000000748a6000: C:\WINDOWS\system32\msi.dll
(0000000074980000 - 0000000074ab0000: C:\WINDOWS\system32\msxml3.dll
(0000000074d90000 - 0000000074dfb000: C:\WINDOWS\system32\USP10.dll
(0000000074e30000 - 0000000074e9c000: C:\WINDOWS\system32\RICHED20.dll
(00000000754d0000 - 0000000075550000: C:\WINDOWS\system32\CRYPTUI.dll
(0000000075c50000 - 0000000075cbe000: c:\windows\system32\jscript.dll
(0000000075cf0000 - 0000000075d81000: C:\WINDOWS\system32\mlang.dll
(0000000075e60000 - 0000000075e73000: C:\WINDOWS\system32\CRYPTNET.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000075f40000 - 0000000075f51000: C:\WINDOWS\System32\devenum.dll
(0000000076360000 - 0000000076370000: C:\WINDOWS\system32\WINSTA.dll
(0000000076380000 - 0000000076385000: C:\WINDOWS\system32\MSIMG32.DLL
(0000000076390000 - 00000000763ad000: C:\WINDOWS\system32\IMM32.dll
(00000000767f0000 - 0000000076817000: C:\WINDOWS\system32\schannel.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076bf0000 - 0000000076bfb000: C:\WINDOWS\system32\PSAPI.DLL
(0000000076c30000 - 0000000076c5e000: C:\WINDOWS\system32\WINTRUST.dll
(0000000076c90000 - 0000000076cb8000: C:\WINDOWS\system32\IMAGEHLP.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076e80000 - 0000000076e8e000: C:\WINDOWS\system32\rtutils.dll
(0000000076e90000 - 0000000076ea2000: C:\WINDOWS\system32\rasman.dll
(0000000076eb0000 - 0000000076edf000: C:\WINDOWS\system32\TAPI32.dll
(0000000076ee0000 - 0000000076f1c000: C:\WINDOWS\system32\RASAPI32.DLL
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f50000 - 0000000076f58000: C:\WINDOWS\system32\wtsapi32.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fb0000 - 0000000076fb8000: C:\WINDOWS\System32\winrnr.dll
(0000000076fc0000 - 0000000076fc6000: C:\WINDOWS\system32\rasadhlp.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077256000: C:\WINDOWS\system32\WININET.dll
(0000000077260000 - 0000000077300000: C:\WINDOWS\system32\urlmon.dll
(00000000773d0000 - 00000000774d2000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2180_x-ww_a84f1ff9\comctl32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077710000 - 0000000077751000: C:\WINDOWS\System32\es.dll
(0000000077760000 - 00000000778ce000: C:\WINDOWS\System32\shdocvw.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\setupapi.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\appHelp.dll
(0000000077bd0000 - 0000000077bd7000: C:\WINDOWS\system32\midimap.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077c70000 - 0000000077c93000: C:\WINDOWS\system32\msv1_0.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\secur32.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll
(000000007dc30000 - 000000007df1f000: C:\WINDOWS\System32\mshtml.dll

*----> State Dump for Thread Id 0x78c <----*

eax=ffffffff ebx=0602fffc ecx=06030020 edx=fffffff7 esi=012e2010 edi=0603bdd4
eip=00722489 esp=0006f638 ebp=0006f654 iopl=0 nv up ei ng nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000282

*** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\MSN Messenger\MsnMsgr.Exe
function: MsnMsgr
00722470 47 inc edi
00722471 048b add al,0x8b
00722473 40 inc eax
00722474 18834d0cff3b sbb [ebx+0x3bff0c4d],al
0072247a c3 ret
0072247b 7444 jz MsnMsgr+0x3224c1 (007224c1)
0072247d 8b4e0c mov ecx,[esi+0xc]
00722480 8b4910 mov ecx,[ecx+0x10]
00722483 8d14c0 lea edx,[eax+eax*8]
00722486 8d1c91 lea ebx,[ecx+edx*4]
FAULT ->00722489 803b00 cmp byte ptr [ebx],0x0 ds:0023:0602fffc=??
0072248c 7522 jnz MsnMsgr+0x3224b0 (007224b0)
0072248e 8b4b0c mov ecx,[ebx+0xc]
00722491 3b4f0c cmp ecx,[edi+0xc]
00722494 751a jnz MsnMsgr+0x3224b0 (007224b0)
00722496 8b4b08 mov ecx,[ebx+0x8]
00722499 3b4f08 cmp ecx,[edi+0x8]
0072249c 7512 jnz MsnMsgr+0x3224b0 (007224b0)
0072249e 837d0cff cmp dword ptr [ebp+0xc],0xffffffff
007224a2 7505 jnz MsnMsgr+0x3224a9 (007224a9)
007224a4 89450c mov [ebp+0xc],eax

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0006f654 00722603 00000545 ffffffff 0000bdb4 MsnMsgr+0x322489
0086e648 00730075 00460065 0063006f 00730075 MsnMsgr+0x322603
006f004d 4d89c88b 3bc033f0 fc4589c8 e8560674 MsnMsgr+0x330075
59ffecac 00000000 00000000 00000000 00000000 0x4d89c88b

*----> Raw Stack Dump <----*
000000000006f638 1c f6 86 00 b8 d3 55 03 - 00 d3 55 03 ff ff ff ff ......U...U.....
000000000006f648 00 00 00 00 20 00 03 06 - e0 e0 48 00 48 e6 86 00 .... .....H.H...
000000000006f658 03 26 72 00 45 05 00 00 - ff ff ff ff b4 bd 00 00 .&r.E...........
000000000006f668 52 06 00 00 c8 f6 06 00 - 24 00 dd 01 14 f7 06 00 R.......$.......
000000000006f678 b8 d3 55 03 d8 cf 71 00 - 48 e6 86 00 01 00 00 00 ..U...q.H.......
000000000006f688 24 00 dd 01 00 05 38 01 - 00 05 38 01 b8 d3 55 03 $.....8...8...U.
000000000006f698 00 68 72 00 00 00 00 00 - 00 00 00 00 00 00 00 00 .hr.............
000000000006f6a8 00 00 00 00 44 00 00 00 - 11 03 00 00 14 00 00 00 ....D...........
000000000006f6b8 fd 83 00 00 00 05 38 01 - 03 00 00 00 b8 d3 55 03 ......8.......U.
000000000006f6c8 00 00 00 00 b8 d3 55 03 - fc f6 06 00 34 87 d4 77 ......U.....4..w
000000000006f6d8 00 00 00 00 20 00 00 00 - 20 04 09 00 01 00 00 02 .... ... .......
000000000006f6e8 74 65 72 00 cd ab ba dc - 00 00 00 00 38 f7 06 00 ter.........8...
000000000006f6f8 74 65 72 00 64 f7 06 00 - d9 8b d4 77 00 f0 fd 7f ter.d......w....
000000000006f708 64 f7 06 00 5a 88 d4 77 - 24 f7 06 00 2a 88 d4 77 d...Z..w$...*..w
000000000006f718 00 00 00 00 22 05 07 00 - e8 15 3d 00 14 00 00 00 ....".....=.....
000000000006f728 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
000000000006f738 00 00 00 00 19 00 00 00 - 01 00 00 00 00 00 00 00 ................
000000000006f748 00 00 00 00 18 f7 06 00 - a8 f7 06 00 a8 f7 06 00 ................
000000000006f758 67 04 d7 77 30 88 d4 77 - ff ff ff ff 2a 88 d4 77 g..w0..w....*..w
000000000006f768 c0 b4 d4 77 00 00 00 00 - 74 65 72 00 22 05 07 00 ...w....ter."...

*----> State Dump for Thread Id 0x83c <----*

eax=000000c0 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000001
eip=7c90eb94 esp=017ffcec ebp=017fffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
017fffb4 7c80b50b 00000000 00090000 00000000 ntdll!KiFastSystemCallRet
017fffec 00000000 7c929fae 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000017ffcec ab e9 90 7c d5 a0 92 7c - 14 00 00 00 30 fd 7f 01 ...|...|....0...
00000000017ffcfc 01 00 00 00 01 00 00 00 - 00 00 00 00 00 00 09 00 ................
00000000017ffd0c 00 00 00 00 00 00 00 00 - 08 e5 97 7c 08 e5 97 7c ...........|...|
00000000017ffd1c 04 03 00 00 3c 08 00 00 - 14 00 00 00 14 00 00 00 ....<...........
00000000017ffd2c 13 00 00 00 00 03 00 00 - 70 00 00 00 40 03 00 00 ........p...@...
00000000017ffd3c 4c 03 00 00 68 03 00 00 - 74 03 00 00 80 03 00 00 L...h...t.......
00000000017ffd4c ac 03 00 00 b4 03 00 00 - bc 03 00 00 cc 03 00 00 ................
00000000017ffd5c d4 03 00 00 e0 03 00 00 - ec 03 00 00 f8 03 00 00 ................
00000000017ffd6c 00 04 00 00 0c 04 00 00 - 18 04 00 00 24 04 00 00 ............$...
00000000017ffd7c 2c 04 00 00 cc 07 00 00 - 54 04 00 00 60 04 00 00 ,.......T...`...
00000000017ffd8c 6c 04 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 l...............
00000000017ffd9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000017ffdac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000017ffdbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000017ffdcc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000017ffddc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000017ffdec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000017ffdfc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000017ffe0c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000017ffe1c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x840 <----*

eax=769c8831 ebx=0183fef4 ecx=0006dcc4 edx=0006df78 esi=00000000 edi=7ffd8000
eip=7c90eb94 esp=0183fecc ebp=0183ff68 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USERENV.dll -
ChildEBP RetAddr Args to Child
0183ff68 7c809c86 00000003 76a60310 00000000 ntdll!KiFastSystemCallRet
0183ff84 769c888d 00000003 76a60310 00000000 kernel32!WaitForMultipleObjects+0x18
0183ffb4 7c80b50b 00000000 00000000 00000000 USERENV!UnregisterGPNotification+0x15c
0183ffec 00000000 769c8831 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000183fecc ab e9 90 7c f2 94 80 7c - 03 00 00 00 f4 fe 83 01 ...|...|........
000000000183fedc 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000183feec b8 03 a6 76 77 9b 80 7c - 50 03 00 00 54 03 00 00 ...vw..|P...T...
000000000183fefc 58 03 00 00 5c fe 83 01 - 6c ff 83 01 6c ff 83 01 X...\...l...l...
000000000183ff0c 18 ee 90 7c 70 05 91 7c - 14 00 00 00 01 00 00 00 ...|p..|........
000000000183ff1c 00 00 00 00 00 00 00 00 - 10 00 00 00 f6 1b 80 7c ...............|
000000000183ff2c 00 00 00 00 00 00 00 00 - 00 80 fd 7f 00 90 fd 7f ................
000000000183ff3c 40 5d 09 00 00 00 00 00 - f4 fe 83 01 00 00 00 00 @]..............
000000000183ff4c 03 00 00 00 e8 fe 83 01 - 00 00 00 00 dc ff 83 01 ................
000000000183ff5c f3 99 83 7c 90 95 80 7c - 00 00 00 00 84 ff 83 01 ...|...|........
000000000183ff6c 86 9c 80 7c 03 00 00 00 - 10 03 a6 76 00 00 00 00 ...|.......v....
000000000183ff7c ff ff ff ff 00 00 00 00 - b4 ff 83 01 8d 88 9c 76 ...............v
000000000183ff8c 03 00 00 00 10 03 a6 76 - 00 00 00 00 ff ff ff ff .......v........
000000000183ff9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 9c 76 ...............v
000000000183ffac 03 00 00 00 00 00 00 00 - ec ff 83 01 0b b5 80 7c ...............|
000000000183ffbc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000183ffcc 00 90 fd 7f 00 26 1c 83 - c0 ff 83 01 a0 79 59 ff .....&.......yY.
000000000183ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
000000000183ffec 00 00 00 00 00 00 00 00 - 31 88 9c 76 00 00 00 00 ........1..v....
000000000183fffc 00 00 00 00 03 05 04 fe - 03 08 06 fe 04 0a 08 fe ................

*----> State Dump for Thread Id 0x848 <----*

eax=00000001 ebx=01d8fba8 ecx=00303128 edx=00303088 esi=00000000 edi=7ffd8000
eip=7c90eb94 esp=01d8fb80 ebp=01d8fc1c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\MSN Messenger\msidcrl.dll -
ChildEBP RetAddr Args to Child
01d8fc1c 7c809c86 00000003 01d8fe5c 00000000 ntdll!KiFastSystemCallRet
01d8fc38 002e7097 00000003 01d8fe5c 00000000 kernel32!WaitForMultipleObjects+0x18
01d8ff5c 002e76ae 7c90ee18 01123b28 01123a90 msidcrl!GetExtendedError+0x43797
01d8ff80 002f0bf7 01123a30 7c90ee18 01120178 msidcrl!GetExtendedError+0x43dae
01d8ffb4 7c80b50b 01123a90 7c90ee18 01120178 msidcrl!GetExtendedError+0x4d2f7
01d8ffec 00000000 002f0b88 01123a90 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001d8fb80 ab e9 90 7c f2 94 80 7c - 03 00 00 00 a8 fb d8 01 ...|...|........
0000000001d8fb90 01 00 00 00 00 00 00 00 - 00 00 00 00 03 00 00 00 ................
0000000001d8fba0 30 3a 12 01 9c 34 29 00 - 70 04 00 00 74 04 00 00 0:...4).p...t...
0000000001d8fbb0 40 04 00 00 00 00 98 74 - ac fb d8 01 00 00 00 00 @......t........
0000000001d8fbc0 94 fc d8 01 10 f6 9a 74 - 14 00 00 00 01 00 00 00 .......t........
0000000001d8fbd0 00 00 00 00 00 00 00 00 - 10 00 00 00 62 31 9a 74 ............b1.t
0000000001d8fbe0 b8 3b 19 00 02 00 00 00 - 00 80 fd 7f 00 70 fd 7f .;...........p..
0000000001d8fbf0 00 00 00 00 00 00 00 00 - a8 fb d8 01 02 00 00 00 ................
0000000001d8fc00 03 00 00 00 9c fb d8 01 - 00 00 00 00 74 ff d8 01 ............t...
0000000001d8fc10 f3 99 83 7c 90 95 80 7c - 00 00 00 00 38 fc d8 01 ...|...|....8...
0000000001d8fc20 86 9c 80 7c 03 00 00 00 - 5c fe d8 01 00 00 00 00 ...|....\.......
0000000001d8fc30 ff ff ff ff 00 00 00 00 - 5c ff d8 01 97 70 2e 00 ........\....p..
0000000001d8fc40 03 00 00 00 5c fe d8 01 - 00 00 00 00 ff ff ff ff ....\...........
0000000001d8fc50 18 ee 90 7c 28 3b 12 01 - 90 3a 12 01 00 00 00 00 ...|(;...:......
0000000001d8fc60 00 00 00 00 00 00 00 00 - 00 00 00 00 10 31 30 00 .............10.
0000000001d8fc70 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001d8fc80 00 80 fd 7f 00 00 00 00 - a4 1e 19 00 00 00 00 00 ................
0000000001d8fc90 00 00 00 00 00 00 00 00 - 18 ee 90 7c 00 00 00 00 ...........|....
0000000001d8fca0 ff ff ff ff 00 00 00 00 - c4 e8 90 7c 00 00 00 00 ...........|....
0000000001d8fcb0 30 fd d8 01 00 00 00 00 - 90 3a 12 01 00 00 00 00 0........:......

*----> State Dump for Thread Id 0x964 <----*

eax=7ffd6000 ebx=0160cd50 ecx=00000000 edx=00000043 esi=01ecff68 edi=00000000
eip=7c90eb94 esp=01ecff2c ebp=01ecff48 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01ecff48 0063a79b 01ecff68 00000000 00000000 ntdll!KiFastSystemCallRet
01ecff84 0063af76 0113e8c8 00000000 0006e9e4 MsnMsgr+0x23a79b
01ecffb4 7c80b50b 0160cd50 00000000 0006e9e4 MsnMsgr+0x23af76
01ecffec 00000000 0063af53 0160cd50 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001ecff2c be 91 d4 77 f1 91 d4 77 - 68 ff ec 01 00 00 00 00 ...w...wh.......
0000000001ecff3c 00 00 00 00 00 00 00 00 - 24 88 5c 00 84 ff ec 01 ........$.\.....
0000000001ecff4c 9b a7 63 00 68 ff ec 01 - 00 00 00 00 00 00 00 00 ..c.h...........
0000000001ecff5c 00 00 00 00 00 00 00 00 - 50 cd 60 01 c4 00 02 00 ........P.`.....
0000000001ecff6c 19 02 00 00 07 00 00 00 - 00 00 00 00 d8 8b 62 00 ..............b.
0000000001ecff7c f6 00 00 00 79 03 00 00 - b4 ff ec 01 76 af 63 00 ....y.......v.c.
0000000001ecff8c c8 e8 13 01 00 00 00 00 - e4 e9 06 00 50 cd 60 01 ............P.`.
0000000001ecff9c 00 00 00 00 00 00 00 00 - 90 ff ec 01 dc ff ec 01 ................
0000000001ecffac cf e1 7c 00 00 00 00 00 - ec ff ec 01 0b b5 80 7c ..|............|
0000000001ecffbc 50 cd 60 01 00 00 00 00 - e4 e9 06 00 50 cd 60 01 P.`.........P.`.
0000000001ecffcc 00 60 fd 7f 00 26 1c 83 - c0 ff ec 01 90 aa 5b ff .`...&........[.
0000000001ecffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
0000000001ecffec 00 00 00 00 00 00 00 00 - 53 af 63 00 50 cd 60 01 ........S.c.P.`.
0000000001ecfffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001ed000c 00 00 00 00 ff ff ff ff - ff ff ff ff ff ff ff ff ................
0000000001ed001c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
0000000001ed002c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
0000000001ed003c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
0000000001ed004c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................
0000000001ed005c ff ff ff ff ff ff ff ff - ff ff ff ff ff ff ff ff ................

*----> State Dump for Thread Id 0xd94 <----*

eax=00000000 ebx=0195fe68 ecx=7c809f8a edx=0195ff1c esi=00000000 edi=7ffd8000
eip=7c90eb94 esp=0195fe40 ebp=0195fedc iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0195fedc 7c809c86 00000002 0195ff30 00000000 ntdll!KiFastSystemCallRet
0195fef8 0068ce75 00000002 0195ff30 00000000 kernel32!WaitForMultipleObjects+0x18
0195ff44 0055a8da 00000000 0006f1d0 0113f2f8 MsnMsgr+0x28ce75
0195ff80 005bb0d2 0113f2f8 0006f1d0 0006f208 MsnMsgr+0x15a8da
0195ffb4 7c80b50b 0160c5e0 0006f1d0 0006f208 MsnMsgr+0x1bb0d2
0195ffec 00000000 005bb063 0160c5e0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000195fe40 ab e9 90 7c f2 94 80 7c - 02 00 00 00 68 fe 95 01 ...|...|....h...
000000000195fe50 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000195fe60 78 e4 13 01 6e 9c 80 7c - e4 02 00 00 6c 02 00 00 x...n..|....l...
000000000195fe70 92 93 80 7c e5 03 00 00 - 1c ff 95 01 b8 fe 95 01 ...|............
000000000195fe80 f5 16 80 7c 94 16 80 7c - 14 00 00 00 01 00 00 00 ...|...|........
000000000195fe90 00 00 00 00 00 00 00 00 - 10 00 00 00 94 16 80 7c ...............|
000000000195fea0 94 16 80 7c e0 fe 95 01 - 00 80 fd 7f 00 b0 fd 7f ...|............
000000000195feb0 ec fe 95 01 00 00 00 00 - 68 fe 95 01 43 ca d6 76 ........h...C..v
000000000195fec0 02 00 00 00 5c fe 95 01 - 00 00 00 00 74 ff 95 01 ....\.......t...
000000000195fed0 f3 99 83 7c 90 95 80 7c - 00 00 00 00 f8 fe 95 01 ...|...|........
000000000195fee0 86 9c 80 7c 02 00 00 00 - 30 ff 95 01 00 00 00 00 ...|....0.......
000000000195fef0 ff ff ff ff 00 00 00 00 - 44 ff 95 01 75 ce 68 00 ........D...u.h.
000000000195ff00 02 00 00 00 30 ff 95 01 - 00 00 00 00 ff ff ff ff ....0...........
000000000195ff10 d0 f1 06 00 e0 c5 60 01 - 78 e4 13 01 03 01 00 00 ......`.x.......
000000000195ff20 00 00 00 00 00 00 00 00 - 00 00 00 00 6c 02 00 00 ............l...
000000000195ff30 e4 02 00 00 6c 02 00 00 - e5 03 00 00 00 00 d6 76 ....l..........v
000000000195ff40 54 00 00 00 80 ff 95 01 - da a8 55 00 00 00 00 00 T.........U.....
000000000195ff50 d0 f1 06 00 f8 f2 13 01 - a5 a9 55 00 78 e4 13 01 ..........U.x...
000000000195ff60 d0 f1 06 00 e0 c5 60 01 - e0 c5 60 01 13 00 00 00 ......`...`.....
000000000195ff70 60 ff 95 01 a4 ff 95 01 - 00 01 7c 00 00 00 00 00 `.........|.....

*----> State Dump for Thread Id 0xdf4 <----*

eax=01abee01 ebx=00152e90 ecx=019df958 edx=161b0044 esi=7fffffff edi=ffffffff
eip=7c90eb94 esp=019df67c ebp=019df6b8 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\System32\mswsock.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for C:\WINDOWS\system32\ZoneLabs\vetredir.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ZoneLabs\vetredir.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\imslsp.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WS2_32.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WININET.dll -
ChildEBP RetAddr Args to Child
019df6b8 71a55fa7 000005d4 00000650 00000000 ntdll!KiFastSystemCallRet
019df7ac 01d327ca 00000001 019df998 019dfa9c mswsock+0x5fa7
019dfbb8 101b8ee7 00000001 019dfe80 019dfc78 vetredir+0x27ca
019dfc00 71ab2e67 00000001 019dfe80 019dfc78 imslsp!DbgOutput+0x36024
019dfc50 771d7127 00000001 019dfe80 019dfc78 WS2_32!select+0xa7
019dffac 771d925b 019dffec 7c80b50b 000d7d38 WININET!GetUrlCacheEntryInfoExW+0x892
019dffb4 7c80b50b 000d7d38 71ab1404 0000005d WININET!InternetSetStatusCallback+0x1d7
019dffec 00000000 771d924e 000d7d38 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000019df67c c0 e9 90 7c 33 40 a5 71 - d4 05 00 00 01 00 00 00 ...|3@.q........
00000000019df68c a4 f6 9d 01 5c f7 9d 01 - 98 f9 9d 01 4c f7 9d 01 ....\.......L...
00000000019df69c 52 dd 23 3c b8 6d c6 01 - ff ff ff ff ff ff ff 7f R.#<.m..........
00000000019df6ac 90 2e 15 00 00 00 00 00 - 00 00 00 00 ac f7 9d 01 ................
00000000019df6bc a7 5f a5 71 d4 05 00 00 - 50 06 00 00 00 00 00 00 ._.q....P.......
00000000019df6cc 04 00 00 00 7c fd 9d 01 - d0 31 12 00 78 fc 9d 01 ....|....1..x...
00000000019df6dc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000019df6ec 01 00 00 00 80 0f 05 fd - ff ff ff ff e8 1f ac 01 ................
00000000019df6fc 03 00 00 00 f4 1f ac 01 - bc f7 9d 01 09 d8 18 10 ................
00000000019df70c ff ff ff ff 1c f7 9d 01 - 49 1d 00 10 b4 f7 9d 01 ........I.......
00000000019df71c 34 fc 9d 01 32 2b 0c 10 - b0 f7 9d 01 1c 00 00 00 4...2+..........
00000000019df72c 90 2e 15 00 68 f7 9d 01 - 9c fa 9d 01 50 f8 9d 01 ....h.......P...
00000000019df73c 00 00 00 00 4c f7 9d 01 - 00 00 00 00 00 00 00 00 ....L...........
00000000019df74c 80 0f 05 fd ff ff ff ff - 01 00 00 00 00 06 00 00 ................
00000000019df75c 50 06 00 00 19 00 00 00 - 1d 1e 00 10 55 1e 00 10 P...........U...
00000000019df76c f4 1f ac 01 00 00 00 00 - 98 f7 9d 01 a8 f7 9d 01 ................
00000000019df77c cd 1f 00 10 68 50 ac 01 - 00 33 0d 10 e8 1f ac 01 ....hP...3......
00000000019df78c 28 00 00 00 aa dc 00 00 - d0 f6 9d 01 f4 1f ac 01 (...............
00000000019df79c ac fb 9d 01 c8 71 a7 71 - 68 2e a5 71 ff ff ff ff .....q.qh..q....
00000000019df7ac b8 fb 9d 01 ca 27 d3 01 - 01 00 00 00 98 f9 9d 01 .....'..........

*----> State Dump for Thread Id 0xd38 <----*

eax=000000c0 ebx=00000000 ecx=7c800000 edx=00000000 esi=0006ee64 edi=02080000
eip=7c90eb94 esp=01ceff9c ebp=01ceffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01ceffb4 7c80b50b 00000000 02080000 0006ee64 ntdll!KiFastSystemCallRet
01ceffec 00000000 7c92798d 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001ceff9c 5c d8 90 7c d4 79 92 7c - 01 00 00 00 ac ff ce 01 \..|.y.|........
0000000001ceffac 00 00 00 00 00 00 00 80 - ec ff ce 01 0b b5 80 7c ...............|
0000000001ceffbc 00 00 00 00 00 00 08 02 - 64 ee 06 00 00 00 00 00 ........d.......
0000000001ceffcc 00 40 fd 7f 00 26 1c 83 - c0 ff ce 01 98 42 db 82 .@...&.......B..
0000000001ceffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
0000000001ceffec 00 00 00 00 00 00 00 00 - 8d 79 92 7c 00 00 00 00 .........y.|....
0000000001cefffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf00ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf00bc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001cf00cc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xc0 <----*

eax=00000000 ebx=000005dc ecx=01e5ffb0 edx=7c90eb94 esi=019df454 edi=c0000034
eip=7c90eb94 esp=01e5ff00 ebp=01e5ff2c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01e5ff2c 100c6b1a 000005dc 01e5ff64 01e5ff60 ntdll!KiFastSystemCallRet
01e5ff80 100c6ca5 000005dc c0000034 019df454 imslsp!ims_set_block+0x11b3
01e5ffb4 7c80b50b 000005dc c0000034 019df454 imslsp!ims_set_block+0x133e
01e5ffec 00000000 100c6c6f 000005dc 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000001e5ff00 1b e3 90 7c d9 cb 80 7c - dc 05 00 00 60 ff e5 01 ...|...|....`...
0000000001e5ff10 44 ff e5 01 24 ff e5 01 - 00 00 00 00 d9 9a 4f 80 D...$.........O.
0000000001e5ff20 e1 9a 4f 80 8c d1 d3 f7 - 20 d0 d3 f7 80 ff e5 01 ..O..... .......
0000000001e5ff30 1a 6b 0c 10 dc 05 00 00 - 64 ff e5 01 60 ff e5 01 .k......d...`...
0000000001e5ff40 58 ff e5 01 ff ff ff ff - 34 00 00 c0 54 f4 9d 01 X.......4...T...
0000000001e5ff50 dc 05 00 00 dc 05 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e5ff60 30 d0 4f 80 00 00 00 00 - 48 ff e5 01 ec d0 4f 80 0.O.....H.....O.
0000000001e5ff70 a4 ff e5 01 96 09 15 10 - 10 ff 1b 10 ff ff ff ff ................
0000000001e5ff80 b4 ff e5 01 a5 6c 0c 10 - dc 05 00 00 34 00 00 c0 .....l......4...
0000000001e5ff90 54 f4 9d 01 dc 05 00 00 - 00 00 00 00 8c ff e5 01 T...............
0000000001e5ffa0 14 01 50 80 dc ff e5 01 - 96 09 15 10 28 ff 1b 10 ..P.........(...
0000000001e5ffb0 00 00 00 00 ec ff e5 01 - 0b b5 80 7c dc 05 00 00 ...........|....
0000000001e5ffc0 34 00 00 c0 54 f4 9d 01 - dc 05 00 00 00 e0 fa 7f 4...T...........
0000000001e5ffd0 00 26 1c 83 c0 ff e5 01 - 28 6a 59 82 ff ff ff ff .&......(jY.....
0000000001e5ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000001e5fff0 00 00 00 00 6f 6c 0c 10 - dc 05 00 00 00 00 00 00 ....ol..........
0000000001e60000 c8 00 00 00 99 01 00 00 - ff ee ff ee 02 10 00 00 ................
0000000001e60010 00 00 00 00 00 fe 00 00 - 00 00 10 00 00 20 00 00 ............. ..
0000000001e60020 00 02 00 00 00 20 00 00 - 54 00 00 00 ff ef fd 7f ..... ..T.......
0000000001e60030 11 00 08 06 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xc4 <----*

eax=00000219 ebx=01ab57b0 ecx=00000217 edx=00000043 esi=0229ff90 edi=00ef0000
eip=7c90eb94 esp=0229ff54 ebp=0229ff78 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0229ff78 10141e67 0229ff90 00000000 00000000 ntdll!KiFastSystemCallRet
0229ffb4 7c80b50b 01ab57b0 00ef0000 00000000 imslsp!ims_set_block+0x7c500
0229ffec 00000000 10141df4 01ab57b0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000229ff54 be 91 d4 77 82 10 d5 77 - 90 ff 29 02 00 00 00 00 ...w...w..).....
000000000229ff64 00 00 00 00 00 00 00 00 - b0 57 ab 01 00 00 ef 00 .........W......
000000000229ff74 00 00 00 00 b4 ff 29 02 - 67 1e 14 10 90 ff 29 02 ......).g.....).
000000000229ff84 00 00 00 00 00 00 00 00 - 00 00 00 00 70 04 01 00 ............p...
000000000229ff94 19 02 00 00 07 00 00 00 - 00 00 00 00 d8 8b 62 00 ..............b.
000000000229ffa4 f6 00 00 00 79 03 00 00 - 01 00 00 00 b0 57 ab 01 ....y........W..
000000000229ffb4 ec ff 29 02 0b b5 80 7c - b0 57 ab 01 00 00 ef 00 ..)....|.W......
000000000229ffc4 00 00 00 00 b0 57 ab 01 - 00 d0 fa 7f 00 26 1c 83 .....W.......&..
000000000229ffd4 c0 ff 29 02 d8 37 e2 82 - ff ff ff ff f3 99 83 7c ..)..7.........|
000000000229ffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
000000000229fff4 f4 1d 14 10 b0 57 ab 01 - 00 00 00 00 00 00 00 00 .....W..........
00000000022a0004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000022a0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000022a0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000022a0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000022a0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000022a0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000022a0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000022a0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000022a0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xfec <----*

eax=00000588 ebx=022dfdcc ecx=022dff4c edx=00000644 esi=00000000 edi=7ffd8000
eip=7c90eb94 esp=022dfda4 ebp=022dfe40 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
022dfe40 100cc55e 00000004 01abe8d8 00000000 ntdll!KiFastSystemCallRet
022dff80 100cc903 00000640 00000000 019df35c imslsp!ims_set_block+0x6bf7
022dffb4 7c80b50b 00000640 00000000 019df35c imslsp!ims_set_block+0x6f9c
022dffec 00000000 100cc8cd 00000640 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000022dfda4 ab e9 90 7c f2 94 80 7c - 04 00 00 00 cc fd 2d 02 ...|...|......-.
00000000022dfdb4 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000022dfdc4 e4 e8 ab 01 40 06 00 00 - 40 06 00 00 44 06 00 00 ....@...@...D...
00000000022dfdd4 84 05 00 00 88 05 00 00 - 00 00 00 00 e4 e8 ab 01 ................
00000000022dfde4 40 06 00 00 14 00 00 00 - 14 00 00 00 01 00 00 00 @...............
00000000022dfdf4 00 00 00 00 00 00 00 00 - 10 00 00 00 10 fe 2d 02 ..............-.
00000000022dfe04 18 fe 2d 02 1c fe 2d 02 - 00 80 fd 7f 00 c0 fa 7f ..-...-.........
00000000022dfe14 00 00 00 00 00 00 00 00 - cc fd 2d 02 bf ad 0c 10 ..........-.....
00000000022dfe24 04 00 00 00 c0 fd 2d 02 - 30 fe 2d 02 74 ff 2d 02 ......-.0.-.t.-.
00000000022dfe34 f3 99 83 7c 90 95 80 7c - 00 00 00 00 80 ff 2d 02 ...|...|......-.
00000000022dfe44 5e c5 0c 10 04 00 00 00 - d8 e8 ab 01 00 00 00 00 ^...............
00000000022dfe54 ff ff ff ff 00 00 00 00 - 00 00 00 00 5c f3 9d 01 ............\...
00000000022dfe64 40 06 00 00 00 00 00 00 - 58 fe 2d 02 00 00 72 00 @.......X.-...r.
00000000022dfe74 c0 fe 2d 02 50 fe 2d 02 - 54 fe 2d 02 fc fe 2d 02 ..-.P.-.T.-...-.
00000000022dfe84 cc fe 2d 02 cc fe 2d 02 - 03 00 00 00 00 00 00 00 ..-...-.........
00000000022dfe94 69 00 76 00 65 00 72 00 - 00 00 56 00 18 1b ac 01 i.v.e.r...V.....
00000000022dfea4 e4 fe 2d 02 e4 fe 2d 02 - f4 fe 2d 02 f4 fe 2d 02 ..-...-...-...-.
00000000022dfeb4 69 00 76 00 28 a7 ef 00 - 58 fe 2d 02 28 a7 ef 00 i.v.(...X.-.(...
00000000022dfec4 50 fe 2d 02 54 fe 2d 02 - 28 7d ac 01 28 de b2 01 P.-.T.-.(}..(...
00000000022dfed4 28 a7 ef 00 28 a7 ef 00 - 44 00 6f 00 6e 00 6e 00 (...(...D.o.n.n.

*----> State Dump for Thread Id 0xff4 <----*

eax=00000000 ebx=0011cf38 ecx=0231ffb0 edx=7c90eb94 esi=7c90d850 edi=71ac1c1e
eip=7c90eb94 esp=0231fe88 ebp=0231ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0231ffb4 7c80b50b 0011cf38 71ac1c1e 71ac1d07 ntdll!KiFastSystemCallRet
0231ffec 00000000 71aa2b11 0011cf38 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000231fe88 5c d8 90 7c 87 2b aa 71 - 01 00 00 00 9c fe 31 02 \..|.+.q......1.
000000000231fe98 07 1d ac 71 00 00 00 00 - 00 00 00 80 27 07 00 00 ...q........'...
000000000231fea8 00 30 88 c0 43 3a 5c 57 - 49 4e 44 4f 57 53 5c 73 .0..C:\WINDOWS\s
000000000231feb8 79 73 74 65 6d 33 32 5c - 57 53 32 48 45 4c 50 2e ystem32\WS2HELP.
000000000231fec8 64 6c 6c 00 a9 d2 00 00 - fc 3c 88 c0 70 4b 5a ff dll......<..pKZ.
000000000231fed8 3d 87 d5 77 27 07 00 00 - fc 3c 88 c0 e8 7b fc ba =..w'....<...{..
000000000231fee8 2d fe 50 80 f0 7b fc ba - 98 59 88 c0 70 4b 5a ff -.P..{...Y..pKZ.
000000000231fef8 74 ba 26 81 3d 87 d5 77 - 74 ba 26 81 00 00 00 00 t.&.=..wt.&.....
000000000231ff08 20 7c fc ba 0f 15 51 80 - 0a 05 00 00 3c 37 ef f7 |....Q.....<7..
000000000231ff18 24 7c fc ba d9 9a 4f 80 - e1 9a 4f 80 0c 37 ef f7 $|....O...O..7..
000000000231ff28 a0 35 ef f7 d4 35 ef f7 - 3b 03 01 00 8e 83 63 80 .5...5..;.....c.
000000000231ff38 78 49 5a ff a0 35 ef f7 - 00 b0 fa 7f 84 7c fc ba xIZ..5.......|..
000000000231ff48 2c 01 50 80 00 00 00 00 - 05 00 00 00 00 00 00 00 ,.P.............
000000000231ff58 00 00 00 00 00 00 00 00 - 30 d0 4f 80 00 00 00 00 ........0.O.....
000000000231ff68 00 00 00 00 ec d0 4f 80 - e7 02 6d 80 a0 35 ef f7 ......O...m..5..
000000000231ff78 50 7d fc ba 00 00 00 00 - 00 00 00 00 01 7c fc ba P}...........|..
000000000231ff88 00 00 00 00 78 49 5a ff - de fc 4f 80 00 00 00 00 ....xIZ...O.....
000000000231ff98 00 00 00 00 00 00 00 00 - 14 01 50 80 9c 7c fc ba ..........P..|..
000000000231ffa8 35 0c 6d 80 00 00 00 00 - f7 7b 00 00 ec ff 31 02 5.m......{....1.
000000000231ffb8 0b b5 80 7c 38 cf 11 00 - 1e 1c ac 71 07 1d ac 71 ...|8......q...q

*----> State Dump for Thread Id 0xf9c <----*

eax=01ab50b0 ebx=00000000 ecx=025cfdd0 edx=01ab58e8 esi=025cff54 edi=ffffffff
eip=7c90eb94 esp=025cff00 ebp=025cff24 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
025cff24 100c24f9 025cff54 00000000 00000000 ntdll!KiFastSystemCallRet
025cffb4 7c80b50b 00000000 ffffffff 7c910732 imslsp+0xc24f9
025cffec 00000000 100c2374 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000025cff00 be 91 d4 77 82 10 d5 77 - 54 ff 5c 02 00 00 00 00 ...w...wT.\.....
00000000025cff10 00 00 00 00 00 00 00 00 - 00 00 00 00 ff ff ff ff ................
00000000025cff20 32 07 91 7c b4 ff 5c 02 - f9 24 0c 10 54 ff 5c 02 2..|..\..$..T.\.
00000000025cff30 00 00 00 00 00 00 00 00 - 00 00 00 00 ff ff ff ff ................
00000000025cff40 32 07 91 7c 00 00 00 00 - 2c 01 50 80 00 00 00 00 2..|....,.P.....
00000000025cff50 05 00 00 00 84 04 01 00 - 13 01 00 00 01 0b 00 00 ................
00000000025cff60 00 00 00 00 d9 35 65 00 - f4 02 00 00 3a 02 00 00 .....5e.....:...
00000000025cff70 03 00 00 00 7a 25 0c 10 - 00 00 00 00 00 00 00 00 ....z%..........
00000000025cff80 00 00 00 10 03 00 01 00 - 11 00 01 00 10 00 90 01 ................
00000000025cff90 00 00 00 00 64 c7 27 10 - 01 00 00 00 3c ff 5c 02 ....d.'.....<.\.
00000000025cffa0 14 01 50 80 dc ff 5c 02 - 96 09 15 10 80 fe 1b 10 ..P...\.........
00000000025cffb0 00 00 00 00 ec ff 5c 02 - 0b b5 80 7c 00 00 00 00 ......\....|....
00000000025cffc0 ff ff ff ff 32 07 91 7c - 00 00 00 00 00 80 fa 7f ....2..|........
00000000025cffd0 00 26 1c 83 c0 ff 5c 02 - 40 45 ce f7 ff ff ff ff .&....\.@E......
00000000025cffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
00000000025cfff0 00 00 00 00 74 23 0c 10 - 00 00 00 00 00 00 00 00 ....t#..........
00000000025d0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000025d0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000025d0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000025d0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xe50 <----*

eax=01770000 ebx=03b5fef8 ecx=00000021 edx=7c90eb94 esi=00000000 edi=7ffd8000
eip=7c90eb94 esp=03b5fed0 ebp=03b5ff6c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\wdmaud.drv -
ChildEBP RetAddr Args to Child
03b5ff6c 7c809c86 00000002 03b5ffa4 00000000 ntdll!KiFastSystemCallRet
03b5ff88 72d2312a 00000002 03b5ffa4 00000000 kernel32!WaitForMultipleObjects+0x18
03b5ffb4 7c80b50b 00000000 00000000 00090000 wdmaud!midMessage+0x348
03b5ffec 00000000 72d230e8 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000003b5fed0 ab e9 90 7c f2 94 80 7c - 02 00 00 00 f8 fe b5 03 ...|...|........
0000000003b5fee0 01 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003b5fef0 00 00 00 00 00 00 00 00 - 84 07 00 00 bc 07 00 00 ................
0000000003b5ff00 2a 26 80 7c 18 ff b5 03 - 00 26 80 7c 30 25 80 7c *&.|.....&.|0%.|
0000000003b5ff10 00 00 00 00 00 00 00 00 - 14 00 00 00 01 00 00 00 ................
0000000003b5ff20 00 00 00 00 00 00 00 00 - 10 00 00 00 54 c0 d3 f7 ............T...
0000000003b5ff30 61 44 54 80 00 80 fd 7f - 00 80 fd 7f 00 d0 fd 7f aDT.............
0000000003b5ff40 00 00 00 00 00 00 00 00 - f8 fe b5 03 dc ff b5 03 ................
0000000003b5ff50 02 00 00 00 ec fe b5 03 - ff ff ff ff dc ff b5 03 ................
0000000003b5ff60 f3 99 83 7c 90 95 80 7c - 00 00 00 00 88 ff b5 03 ...|...|........
0000000003b5ff70 86 9c 80 7c 02 00 00 00 - a4 ff b5 03 00 00 00 00 ...|............
0000000003b5ff80 ff ff ff ff 00 00 00 00 - b4 ff b5 03 2a 31 d2 72 ............*1.r
0000000003b5ff90 02 00 00 00 a4 ff b5 03 - 00 00 00 00 ff ff ff ff ................
0000000003b5ffa0 00 00 09 00 84 07 00 00 - bc 07 00 00 01 00 00 00 ................
0000000003b5ffb0 01 00 00 00 ec ff b5 03 - 0b b5 80 7c 00 00 00 00 ...........|....
0000000003b5ffc0 00 00 00 00 00 00 09 00 - 00 00 00 00 00 d0 fd 7f ................
0000000003b5ffd0 00 26 1c 83 c0 ff b5 03 - 10 8c 00 83 ff ff ff ff .&..............
0000000003b5ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000003b5fff0 00 00 00 00 e8 30 d2 72 - 00 00 00 00 00 00 00 00 .....0.r........
0000000003b60000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x498 <----*

eax=00000000 ebx=0000051c ecx=7c801694 edx=00000000 esi=03b9ff98 edi=77d51042
eip=7c90eb94 esp=03b9ff54 ebp=03b9ff78 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\WINMM.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
03b9ff78 76b44e3d 03b9ff98 00000000 00000000 ntdll!KiFastSystemCallRet
03b9ffb4 7c80b50b 0000051c 00000200 0000002b WINMM!PlaySoundW+0x7e6
03b9ffec 00000000 76b44dd6 0000051c 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000003b9ff54 be 91 d4 77 82 10 d5 77 - 98 ff b9 03 00 00 00 00 ...w...w........
0000000003b9ff64 00 00 00 00 00 00 00 00 - 1c 05 00 00 42 10 d5 77 ............B..w
0000000003b9ff74 00 00 00 00 b4 ff b9 03 - 3d 4e b4 76 98 ff b9 03 ........=N.v....
0000000003b9ff84 00 00 00 00 00 00 00 00 - 00 00 00 00 00 02 00 00 ................
0000000003b9ff94 2b 00 00 00 c8 04 05 00 - bc 03 00 00 30 15 70 02 +...........0.p.
0000000003b9ffa4 00 00 00 00 b7 ea 64 00 - a7 01 00 00 e0 01 00 00 ......d.........
0000000003b9ffb4 ec ff b9 03 0b b5 80 7c - 1c 05 00 00 00 02 00 00 .......|........
0000000003b9ffc4 2b 00 00 00 1c 05 00 00 - 00 90 fa 7f 00 26 1c 83 +............&..
0000000003b9ffd4 c0 ff b9 03 10 8c 00 83 - ff ff ff ff f3 99 83 7c ...............|
0000000003b9ffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
0000000003b9fff4 d6 4d b4 76 1c 05 00 00 - 00 00 00 00 00 00 00 00 .M.v............
0000000003ba0004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ba0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ba0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ba0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ba0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ba0054 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ba0064 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ba0074 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003ba0084 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xac8 <----*

eax=03d45340 ebx=004b2fdd ecx=00000000 edx=00000000 esi=0000091c edi=00000000
eip=7c90eb94 esp=05c2ff08 ebp=05c2ff6c iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\System32\mshtml.dll -
ChildEBP RetAddr Args to Child
05c2ff6c 7c802542 0000091c ffffffff 00000000 ntdll!KiFastSystemCallRet
05c2ff80 7ddfc1b3 0000091c ffffffff 75c54269 kernel32!WaitForSingleObject+0x12
05c2ffa4 7dd1717e 75c53c0d 7dd17150 05c2ffec mshtml+0x1cc1b3
05c2ffb4 7c80b50b 03d46190 75c54269 75c53c0d mshtml+0xe717e
05c2ffec 00000000 7dd17143 03d46190 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
0000000005c2ff08 c0 e9 90 7c db 25 80 7c - 1c 09 00 00 00 00 00 00 ...|.%.|........
0000000005c2ff18 00 00 00 00 fc 61 d4 03 - 90 61 d4 03 dd 2f 4b 00 .....a...a.../K.
0000000005c2ff28 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000005c2ff38 10 00 00 00 d0 02 d4 03 - 8c 8b d4 77 00 80 fd 7f ...........w....
0000000005c2ff48 00 00 fa 7f 00 00 00 00 - 00 00 00 00 1c ff c2 05 ................
0000000005c2ff58 0b d3 c9 7d dc ff c2 05 - f3 99 83 7c 08 26 80 7c ...}.......|.&.|
0000000005c2ff68 00 00 00 00 80 ff c2 05 - 42 25 80 7c 1c 09 00 00 ........B%.|....
0000000005c2ff78 ff ff ff ff 00 00 00 00 - a4 ff c2 05 b3 c1 df 7d ...............}
0000000005c2ff88 1c 09 00 00 ff ff ff ff - 69 42 c5 75 90 61 d4 03 ........iB.u.a..
0000000005c2ff98 90 61 d4 03 00 00 00 00 - ff ff ff ff b4 ff c2 05 .a..............
0000000005c2ffa8 7e 71 d1 7d 0d 3c c5 75 - 50 71 d1 7d ec ff c2 05 ~q.}.<.uPq.}....
0000000005c2ffb8 0b b5 80 7c 90 61 d4 03 - 69 42 c5 75 0d 3c c5 75 ...|.a..iB.u.<.u
0000000005c2ffc8 90 61 d4 03 00 00 fa 7f - 00 26 1c 83 c0 ff c2 05 .a.......&......
0000000005c2ffd8 38 12 f7 82 ff ff ff ff - f3 99 83 7c 18 b5 80 7c 8..........|...|
0000000005c2ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 43 71 d1 7d ............Cq.}
0000000005c2fff8 90 61 d4 03 00 00 00 00 - 08 00 00 00 00 01 00 03 .a..............
0000000005c30008 ee ff ee ff 00 00 00 00 - 00 00 09 00 00 f0 3f 00 ..............?.
0000000005c30018 00 00 c3 05 00 04 00 00 - 40 00 c3 05 00 00 03 06 ........@.......
0000000005c30028 ff 03 00 00 01 00 00 00 - 60 00 d2 01 00 00 00 00 ........`.......
0000000005c30038 d0 0f c3 05 00 00 00 00 - 8f 01 08 00 32 00 08 03 ............2...

*----> State Dump for Thread Id 0x270 <----*

eax=054efde4 ebx=00000000 ecx=00118254 edx=49880017 esi=000931c0 edi=00093264
eip=7c90eb94 esp=054efe1c ebp=054eff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
054eff80 77e76c22 054effa8 77e76a3b 000931c0 ntdll!KiFastSystemCallRet
054eff88 77e76a3b 000931c0 00000000 00090000 RPCRT4!I_RpcBCacheFree+0x5ea
054effa8 77e76c0a 000a6b90 054effec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
054effb4 7c80b50b 00155670 00000000 00090000 RPCRT4!I_RpcBCacheFree+0x5d2
054effec 00000000 77e76bf0 00155670 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000054efe1c 99 e3 90 7c 03 67 e7 77 - 44 02 00 00 70 ff 4e 05 ...|.g.wD...p.N.
00000000054efe2c 00 00 00 00 48 0f 73 05 - 4c ff 4e 05 c8 a6 39 81 ....H.s.L.N...9.
00000000054efe3c 00 00 00 00 fc 3c 88 c0 - e0 49 dc 82 95 23 00 00 .....<...I...#..
00000000054efe4c 64 5b c1 b9 02 ec 51 80 - 00 00 00 00 e0 49 dc 82 d[....Q......I..
00000000054efe5c 00 d0 fd 7f 90 5b c1 b9 - f8 1f 60 c0 6c 5b c1 b9 .....[....`.l[..
00000000054efe6c 04 00 00 00 00 d0 fd 7f - 01 00 00 00 00 00 00 00 ................
00000000054efe7c e8 fe 3f c0 00 00 00 00 - 00 00 00 00 00 e0 fd 7f ..?.............
00000000054efe8c 28 5c c1 b9 df f0 51 80 - 90 5b c1 b9 00 00 00 00 (\....Q..[......
00000000054efe9c 00 00 00 00 00 00 00 00 - 18 5a d1 f7 e8 47 dc 82 .........Z...G..
00000000054efeac 01 48 dc 82 00 00 00 00 - e8 fe 3f c0 00 00 00 00 .H........?.....
00000000054efebc d4 5b c1 b9 00 00 04 00 - 7f 1d 00 00 b4 48 dc 82 .[...........H..
00000000054efecc ff ff d7 01 e8 47 dc 82 - 00 00 00 00 00 00 00 00 .....G..........
00000000054efedc 00 00 d8 01 40 5b c1 b9 - d8 d5 14 83 ff ff ff ff ....@[..........
00000000054efeec 10 50 53 80 00 d0 fd 7f - ff ff ff ff 90 75 5a 80 .PS..........uZ.
00000000054efefc 08 c8 53 80 ff ff ff ff - b8 5c c1 b9 bc 5c c1 b9 ..S......\...\..
00000000054eff0c 00 80 00 00 14 5d c1 b9 - bc 41 cf f7 24 5c c1 b9 .....]...A..$\..
00000000054eff1c d9 9a 4f 80 e1 9a 4f 80 - 8c 41 cf f7 20 40 cf f7 ..O...O..A.. @..
00000000054eff2c 54 40 cf f7 80 ff 4e 05 - 99 66 e7 77 4c ff 4e 05 T@....N..f.wL.N.
00000000054eff3c a9 66 e7 77 ed 10 90 7c - 10 4a 16 00 70 56 15 00 .f.w...|.J..pV..
00000000054eff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0xba8 <----*

eax=0271aa38 ebx=c0000000 ecx=000004d4 edx=00177d70 esi=00000000 edi=71a87558
eip=7c90eb94 esp=0251ff7c ebp=0251ffb4 iopl=0 nv up ei pl nz na pe nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000202

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0251ffb4 7c80b50b 71a5d8ec 0006f924 7c90ee18 ntdll!KiFastSystemCallRet
0251ffec 00000000 71a5d5af 00164250 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000251ff7c 1b e3 90 7c 09 d6 a5 71 - 78 06 00 00 bc ff 51 02 ...|...qx.....Q.
000000000251ff8c b0 ff 51 02 a4 ff 51 02 - 50 d6 a5 71 24 f9 06 00 ..Q...Q.P..q$...
000000000251ff9c 18 ee 90 7c 50 42 16 00 - 00 00 00 00 00 00 00 00 ...|PB..........
000000000251ffac 00 00 a5 71 58 22 78 02 - ec ff 51 02 0b b5 80 7c ...qX"x...Q....|
000000000251ffbc ec d8 a5 71 24 f9 06 00 - 18 ee 90 7c 50 42 16 00 ...q$......|PB..
000000000251ffcc 00 c0 fd 7f 00 26 1c 83 - c0 ff 51 02 c0 5e eb 82 .....&....Q..^..
000000000251ffdc ff ff ff ff f3 99 83 7c - 18 b5 80 7c 00 00 00 00 .......|...|....
000000000251ffec 00 00 00 00 00 00 00 00 - af d5 a5 71 50 42 16 00 ...........qPB..
000000000251fffc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000252000c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000252001c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000252002c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000252003c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000252004c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000252005c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000252006c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000252007c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000252008c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000252009c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000025200ac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xe5c <----*

eax=000a5b84 ebx=00000000 ecx=00000001 edx=000e08b8 esi=000931c0 edi=00000000
eip=7c90eb94 esp=0255fe1c ebp=0255ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0255ff80 77e76c22 0255ffa8 77e76a3b 000931c0 ntdll!KiFastSystemCallRet
0255ff88 77e76a3b 000931c0 054efc98 7c90ee18 RPCRT4!I_RpcBCacheFree+0x5ea
0255ffa8 77e76c0a 000a6b90 0255ffec 7c80b50b RPCRT4!I_RpcBCacheFree+0x403
0255ffb4 7c80b50b 00152838 054efc98 7c90ee18 RPCRT4!I_RpcBCacheFree+0x5d2
0255ffec 00000000 77e76bf0 00152838 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000255fe1c 99 e3 90 7c 03 67 e7 77 - 44 02 00 00 70 ff 55 02 ...|.g.wD...p.U.
000000000255fe2c 00 00 00 00 c0 77 0c 00 - 54 ff 55 02 54 b2 3f 81 .....w..T.U.T.?.
000000000255fe3c 00 00 00 00 fc 3c 88 c0 - 18 12 cf f7 3f 2b 00 00 .....<......?+..
000000000255fe4c 64 0b 88 ba aa ec 51 80 - 3f 2b 00 00 18 12 cf f7 d.....Q.?+......
000000000255fe5c 00 c0 f9 7f 90 0b 88 ba - f8 1f 60 c0 6c 0b 88 ba ..........`.l...
000000000255fe6c 8c e9 51 80 00 c0 f9 7f - 01 00 00 00 00 00 00 00 ..Q.............
000000000255fe7c e0 fc 3f c0 00 00 00 00 - 00 00 00 00 00 d0 f9 7f ..?.............
000000000255fe8c 28 0c 88 ba df f0 51 80 - 90 0b 88 ba 00 00 00 00 (.....Q.........
000000000255fe9c 00 00 00 00 00 00 00 00 - 00 9c ec f7 20 10 cf f7 ............ ...
000000000255feac 01 10 cf f7 00 00 00 00 - e0 fc 3f c0 00 00 00 00 ..........?.....
000000000255febc 00 00 00 00 00 00 10 00 - ff 61 00 00 ec 10 cf f7 .........a......
000000000255fecc ff ff 1f 06 20 10 cf f7 - 00 00 00 00 01 00 00 00 .... ...........
000000000255fedc 00 00 20 06 40 0b 88 ba - c0 8b cb f7 ff ff ff ff .. .@...........
000000000255feec 10 50 53 80 00 c0 f9 7f - ff ff ff ff 90 75 5a 80 .PS..........uZ.
000000000255fefc 08 c8 53 80 ff ff ff ff - b8 0c 88 ba bc 0c 88 ba ..S.............
000000000255ff0c 00 80 00 00 14 0d 88 ba - 44 9f d9 f7 24 0c 88 ba ........D...$...
000000000255ff1c d9 9a 4f 80 e1 9a 4f 80 - 14 9f d9 f7 a8 9d d9 f7 ..O...O.........
000000000255ff2c dc 9d d9 f7 80 ff 55 02 - 99 66 e7 77 4c ff 55 02 ......U..f.wL.U.
000000000255ff3c a9 66 e7 77 ed 10 90 7c - 48 7e 71 05 38 28 15 00 .f.w...|H~q.8(..
000000000255ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......

*----> State Dump for Thread Id 0xf40 <----*

eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=0262ff70 ebp=0262ffb4 iopl=0 nv up ei ng nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0262ffb4 7c80b50b 00000000 00000000 0274c5f0 ntdll!KiFastSystemCallRet
0262ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000262ff70 1b e3 90 7c 9d 07 91 7c - bc 05 00 00 ac ff 62 02 ...|...|......b.
000000000262ff80 b0 ff 62 02 98 ff 62 02 - a0 ff 62 02 00 00 00 00 ..b...b...b.....
000000000262ff90 f0 c5 74 02 00 00 00 00 - 00 00 00 00 38 a2 70 05 ..t.........8.p.
000000000262ffa0 00 7c 28 e8 ff ff ff ff - 35 0c 6d 80 69 75 92 7c .|(.....5.m.iu.|
000000000262ffb0 c8 0e 78 02 ec ff 62 02 - 0b b5 80 7c 00 00 00 00 ..x...b....|....
000000000262ffc0 00 00 00 00 f0 c5 74 02 - 00 00 00 00 00 a0 fa 7f ......t.........
000000000262ffd0 00 26 1c 83 c0 ff 62 02 - f8 ee e3 f7 ff ff ff ff .&....b.........
000000000262ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
000000000262fff0 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 ....`..|........
0000000002630000 c1 00 00 00 56 01 00 00 - ff ee ff ee 03 10 00 00 ....V...........
0000000002630010 01 00 00 00 00 fe 00 00 - 00 00 10 00 00 20 00 00 ............. ..
0000000002630020 00 02 00 00 00 20 00 00 - 69 1b 00 00 ff ef fd 7f ..... ..i.......
0000000002630030 15 00 08 06 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002630040 00 00 00 00 98 05 63 02 - 0f 00 00 00 f8 ff ff ff ......c.........
0000000002630050 50 00 63 02 50 00 63 02 - 08 06 63 02 00 00 00 00 P.c.P.c...c.....
0000000002630060 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002630070 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002630080 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000002630090 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000026300a0 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0x7e4 <----*

eax=0000007e ebx=016d6308 ecx=0000007c edx=034cfdec esi=00000858 edi=00000000
eip=7c90eb94 esp=034cfec4 ebp=034cff28 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
034cff28 7c802542 00000858 00001388 00000000 ntdll!KiFastSystemCallRet
034cff3c 007013fe 00000858 00001388 000001e8 kernel32!WaitForSingleObject+0x12
034cff80 005bb0d2 016d45f0 000001e8 000100e8 MsnMsgr+0x3013fe
034cffb4 7c80b50b 016d6308 000001e8 000100e8 MsnMsgr+0x1bb0d2
034cffec 00000000 005bb063 016d6308 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000034cfec4 c0 e9 90 7c db 25 80 7c - 58 08 00 00 00 00 00 00 ...|.%.|X.......
00000000034cfed4 f8 fe 4c 03 00 00 00 00 - a0 fe d3 02 08 63 6d 01 ..L..........cm.
00000000034cfee4 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000034cfef4 10 00 00 00 80 0f 05 fd - ff ff ff ff 00 80 fd 7f ................
00000000034cff04 00 60 fa 7f f8 fe 4c 03 - a0 fe d3 02 d8 fe 4c 03 .`....L.......L.
00000000034cff14 a0 fe d3 02 74 ff 4c 03 - f3 99 83 7c 08 26 80 7c ....t.L....|.&.|
00000000034cff24 00 00 00 00 3c ff 4c 03 - 42 25 80 7c 58 08 00 00 ....<.L.B%.|X...
00000000034cff34 88 13 00 00 00 00 00 00 - 80 ff 4c 03 fe 13 70 00 ..........L...p.
00000000034cff44 58 08 00 00 88 13 00 00 - e8 01 00 00 f0 45 6d 01 X............Em.
00000000034cff54 65 14 70 00 31 14 70 00 - a0 fe d3 02 e8 01 00 00 e.p.1.p.........
00000000034cff64 08 63 6d 01 08 63 6d 01 - 13 00 00 00 60 ff 4c 03 .cm..cm.....`.L.
00000000034cff74 a4 ff 4c 03 21 c4 7d 00 - 00 00 00 00 b4 ff 4c 03 ..L.!.}.......L.
00000000034cff84 d2 b0 5b 00 f0 45 6d 01 - e8 01 00 00 e8 00 01 00 ..[..Em.........
00000000034cff94 08 63 6d 01 00 00 00 00 - 8c ff 4c 03 14 01 50 80 .cm.......L...P.
00000000034cffa4 dc ff 4c 03 6c 9c 5b 00 - f8 7a 42 00 00 00 00 00 ..L.l.[..zB.....
00000000034cffb4 ec ff 4c 03 0b b5 80 7c - 08 63 6d 01 e8 01 00 00 ..L....|.cm.....
00000000034cffc4 e8 00 01 00 08 63 6d 01 - 00 60 fa 7f 00 26 1c 83 .....cm..`...&..
00000000034cffd4 c0 ff 4c 03 68 a0 c6 82 - ff ff ff ff f3 99 83 7c ..L.h..........|
00000000034cffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
00000000034cfff4 63 b0 5b 00 08 63 6d 01 - 00 00 00 00 00 00 00 00 c.[..cm.........

*----> State Dump for Thread Id 0x8e8 <----*

eax=000000a3 ebx=7c901005 ecx=000000a3 edx=000000a3 esi=00000990 edi=00000000
eip=7c90eb94 esp=0387ff14 ebp=0387ff78 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0387ff78 7c802542 00000990 000927c0 00000000 ntdll!KiFastSystemCallRet
0387ff8c 7dcb3cbb 00000990 000927c0 00000005 kernel32!WaitForSingleObject+0x12
0387ffb4 7c80b50b 03d4b3b0 00000005 05743224 mshtml+0x83cbb
0387ffec 00000000 7dd17143 03d4b3b0 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000387ff14 c0 e9 90 7c db 25 80 7c - 90 09 00 00 00 00 00 00 ...|.%.|........
000000000387ff24 48 ff 87 03 00 00 00 00 - b0 b3 d4 03 05 10 90 7c H..............|
000000000387ff34 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000387ff44 10 00 00 00 00 44 5f 9a - fe ff ff ff 00 80 fd 7f .....D_.........
000000000387ff54 00 50 fa 7f 48 ff 87 03 - 80 be d4 03 28 ff 87 03 .P..H.......(...
000000000387ff64 e5 14 ca 7d dc ff 87 03 - f3 99 83 7c 08 26 80 7c ...}.......|.&.|
000000000387ff74 00 00 00 00 8c ff 87 03 - 42 25 80 7c 90 09 00 00 ........B%.|....
000000000387ff84 c0 27 09 00 00 00 00 00 - b4 ff 87 03 bb 3c cb 7d .'...........<.}
000000000387ff94 90 09 00 00 c0 27 09 00 - 05 00 00 00 b0 b3 d4 03 .....'..........
000000000387ffa4 b0 b3 d4 03 7e 71 d1 7d - 24 32 74 05 50 71 d1 7d ....~q.}$2t.Pq.}
000000000387ffb4 ec ff 87 03 0b b5 80 7c - b0 b3 d4 03 05 00 00 00 .......|........
000000000387ffc4 24 32 74 05 b0 b3 d4 03 - 00 50 fa 7f 00 26 1c 83 $2t......P...&..
000000000387ffd4 c0 ff 87 03 98 6f ee 82 - ff ff ff ff f3 99 83 7c .....o.........|
000000000387ffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
000000000387fff4 43 71 d1 7d b0 b3 d4 03 - 00 00 00 00 00 00 00 00 Cq.}............
0000000003880004 00 00 00 00 00 00 00 00 - 00 00 00 01 42 37 34 5f ............B74_
0000000003880014 9d 7d 7c ff 9d 7d 7c ff - 9d 7d 7c ff 9d 7d 7c ff .}|..}|..}|..}|.
0000000003880024 53 46 42 76 10 0e 0d 16 - 03 02 02 04 00 00 00 00 SFBv............
0000000003880034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000003880044 00 00 00 01 56 45 41 83 - 9d 7d 7c ff 61 52 4c 86 ....VEA..}|.aRL.

*----> State Dump for Thread Id 0x99c <----*

eax=03d4e288 ebx=7c901005 ecx=7dc9c3bc edx=7ded2e50 esi=000009e0 edi=00000000
eip=7c90eb94 esp=038cff14 ebp=038cff78 iopl=0 nv up ei ng nz ac pe cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000293

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
038cff78 7c802542 000009e0 000927c0 00000000 ntdll!KiFastSystemCallRet
038cff8c 7dcb3cbb 000009e0 000927c0 00000000 kernel32!WaitForSingleObject+0x12
038cffb4 7c80b50b 03d42850 00000000 00000004 mshtml+0x83cbb
038cffec 00000000 7dd17143 03d42850 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
00000000038cff14 c0 e9 90 7c db 25 80 7c - e0 09 00 00 00 00 00 00 ...|.%.|........
00000000038cff24 48 ff 8c 03 00 00 00 00 - 50 28 d4 03 05 10 90 7c H.......P(.....|
00000000038cff34 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000038cff44 10 00 00 00 00 44 5f 9a - fe ff ff ff 00 80 fd 7f .....D_.........
00000000038cff54 00 40 fa 7f 48 ff 8c 03 - 84 e2 cc 7d 28 ff 8c 03 .@..H......}(...
00000000038cff64 b4 28 d4 03 dc ff 8c 03 - f3 99 83 7c 08 26 80 7c .(.........|.&.|
00000000038cff74 00 00 00 00 8c ff 8c 03 - 42 25 80 7c e0 09 00 00 ........B%.|....
00000000038cff84 c0 27 09 00 00 00 00 00 - b4 ff 8c 03 bb 3c cb 7d .'...........<.}
00000000038cff94 e0 09 00 00 c0 27 09 00 - 00 00 00 00 50 28 d4 03 .....'......P(..
00000000038cffa4 50 28 d4 03 7e 71 d1 7d - 04 00 00 00 50 71 d1 7d P(..~q.}....Pq.}
00000000038cffb4 ec ff 8c 03 0b b5 80 7c - 50 28 d4 03 00 00 00 00 .......|P(......
00000000038cffc4 04 00 00 00 50 28 d4 03 - 00 40 fa 7f 00 26 1c 83 ....P(...@...&..
00000000038cffd4 c0 ff 8c 03 b0 79 6a ff - ff ff ff ff f3 99 83 7c .....yj........|
00000000038cffe4 18 b5 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
00000000038cfff4 43 71 d1 7d 50 28 d4 03 - 00 00 00 00 00 00 00 00 Cq.}P(..........
00000000038d0004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000038d0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000038d0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000038d0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000038d0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................

*----> State Dump for Thread Id 0xc1c <----*

eax=0537fb3c ebx=00000000 ecx=01ab8230 edx=1028d7a0 esi=7c97c380 edi=7c97c3a0
eip=7c90eb94 esp=0537ff70 ebp=0537ffb4 iopl=0 nv up ei ng nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000286

function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e

*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0537ffb4 7c80b50b 00000000 00000000 0272d090 ntdll!KiFastSystemCallRet
0537ffec 00000000 7c910760 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4

*----> Raw Stack Dump <----*
000000000537ff70 1b e3 90 7c 9d 07 91 7c - bc 05 00 00 ac ff 37 05 ...|...|......7.
000000000537ff80 b0 ff 37 05 98 ff 37 05 - a0 ff 37 05 00 00 00 00 ..7...7...7.....
000000000537ff90 90 d0 72 02 00 00 00 00 - 00 00 00 00 c8 0e 78 02 ..r...........x.
000000000537ffa0 00 7c 28 e8 ff ff ff ff - 35 0c 6d 80 69 75 92 7c .|(.....5.m.iu.|
000000000537ffb0 38 a2 70 05 ec ff 37 05 - 0b b5 80 7c 00 00 00 00 8.p...7....|....
000000000537ffc0 00 00 00 00 90 d0 72 02 - 00 00 00 00 00 e0 fd 7f ......r.........
000000000537ffd0 00 26 1c 83 c0 ff 37 05 - a0 97 e9 f7 ff ff ff ff .&....7.........
000000000537ffe0 f3 99 83 7c 18 b5 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
000000000537fff0 00 00 00 00 60 07 91 7c - 00 00 00 00 00 00 00 00 ....`..|........
0000000005380000 cf b4 a6 ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
0000000005380010 f4 de cf ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
0000000005380020 f4 de cf ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
0000000005380030 f4 de cf ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
0000000005380040 f4 de cf ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
0000000005380050 f4 de cf ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
0000000005380060 f4 de cf ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
0000000005380070 f4 de cf ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
0000000005380080 f4 de cf ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
0000000005380090 f4 de cf ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
00000000053800a0 f4 de cf ff 90 56 45 ff - f4 de cf ff 90 56 45 ff .....VE......VE.
 
Im not sure if that is what yous are after but its what ive found. Any other sugestions guys.

After what yous sugested it did help, i managed to get a error screen that says I should turn of shaddowing or caching in the bios and that hardware may not be installed correctly. but my hardware drivers are fine but how do i do that in the bios?
 
Status
Not open for further replies.
Back
Top Bottom