WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for C:\Program Files\Common Files\Roxio Shared\9.0\DLLShared\CPSCommonTools9.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Common Files\Roxio Shared\9.0\DLLShared\CPSCommonTools9.dll -
*** WARNING: Unable to verify checksum for C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSFileLoader.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSFileLoader.dll -
Question
ally
I get the following log on Dr Watson Whenever I try to open Photosuite (which WON"T OPEN)
Does anyone have any idea on what symbols ROxio uses that I don't have on my computer?
Microsoft ® DrWtsn32
Copyright © 1985-2001 Microsoft Corp. All rights reserved.
Application exception occurred:
App: C:\Program Files\Roxio\PhotoSuite 9\PhotoSuite9.exe (pid=2044)
When: 1/16/2007 @ 12:39:15.750
Exception number: c0000005 (access violation)
*----> System Information <----*
Computer Name: DESKTOP
User Name: alison
Terminal Session Id: 0
Number of Processors: 1
Processor Type: x86 Family 15 Model 4 Stepping 1
Windows Version: 5.1
Current Build: 2600
Service Pack: 2
Current Type: Uniprocessor Free
Registered Organization:
Registered Owner: alison
*----> Task List <----*
0 System Process
4 System
592 smss.exe
656 csrss.exe
680 winlogon.exe
724 services.exe
736 lsass.exe
928 svchost.exe
1000 svchost.exe
1096 svchost.exe
1184 svchost.exe
1376 svchost.exe
1572 Explorer.EXE
1636 ccSetMgr.exe
1756 ccEvtMgr.exe
404 ccProxy.exe
416 SNDSrvc.exe
480 SPBBCSvc.exe
504 symlcsvc.exe
1088 spoolsv.exe
1428 ALUSchedulerSvc.exe
1452 CTsvcCDA.EXE
1524 GBPoll.exe
1552 navapsvc.exe
1620 NPFMntor.exe
1852 NPROTECT.EXE
312 NOPDB.EXE
360 svchost.exe
392 MsPMSPSv.exe
1324 BRMFRSMG.EXE
2492 realsched.exe
2500 jusched.exe
2520 StrgSync.exe
2564 DrgToDsc.exe
2572 qttask.exe
2592 PicasaMediaDetector.exe
2608 Rundll32.exe
2616 issch.exe
2716 igfxpers.exe
2740 hkcmd.exe
2752 DMXLauncher.exe
2792 CTSysVol.exe
2832 ccApp.exe
2924 GoogleToolbarNotifier.exe
3348 alg.exe
3520 NSCSRVCE.EXE
2464 msmsgs.exe
2044 PhotoSuite9.exe
2540 wmiprvse.exe
1408 RoxMediaDB9.exe
3048 dwwin.exe
1872 drwtsn32.exe
*----> Module List <----*
(0000000000400000 - 000000000050b000: C:\Program Files\Roxio\PhotoSuite 9\PhotoSuite9.exe
(0000000001910000 - 0000000001979000: C:\Program Files\Common Files\Roxio Shared\DLLShared\homeutils9.dll
(0000000001980000 - 00000000019af000: C:\Program Files\Common Files\Roxio Shared\DLLShared\rsl.dll
(0000000001a70000 - 0000000001b14000: C:\Program Files\Common Files\Roxio Shared\DLLShared\SonicHTTPClient9.dll
(00000000028b0000 - 00000000028ee000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSAboutDlg.dll
(0000000003430000 - 000000000347b000: C:\Program Files\Roxio\PhotoSuite 9\PSNavigationPanes.dll
(0000000010000000 - 0000000010460000: C:\Program Files\Common Files\Roxio Shared\9.0\DLLShared\ROXIPP41.dll
(0000000020000000 - 00000000202c5000: C:\WINDOWS\system32\xpsp2res.dll
(000000004ec50000 - 000000004edf3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.GdiPlus_6595b64144ccf1df_1.0.2600.2180_x-ww_522f9f82\gdiplus.dll
(000000005ad70000 - 000000005ada8000: C:\WINDOWS\system32\UxTheme.dll
(000000005b0a0000 - 000000005b0a7000: C:\WINDOWS\system32\umdmxfrm.dll
(000000005b860000 - 000000005b8b4000: C:\WINDOWS\system32\NETAPI32.dll
(000000005cb70000 - 000000005cb96000: C:\WINDOWS\system32\ShimEng.dll
(000000005cd70000 - 000000005cd77000: C:\WINDOWS\system32\serwvdrv.dll
(000000005d360000 - 000000005d36e000: C:\WINDOWS\system32\MFC71ENU.DLL
(0000000060000000 - 0000000060020000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSCommonEnglish.dll
(0000000060100000 - 0000000060146000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSCommonObjects.dll
(0000000060300000 - 0000000060332000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSFileLoader.dll
(0000000060400000 - 000000006041a000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSFileProtocolHandler.dll
(0000000060900000 - 000000006091f000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSFormatLoaderPNG.dll
(0000000060e00000 - 0000000060ed2000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSBasicControls.dll
(0000000060f00000 - 0000000060f5d000: C:\Program Files\Common Files\Roxio Shared\9.0\DLLShared\CPSCommonTools9.dll
(0000000061000000 - 00000000610e0000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSExtendedControls.dll
(0000000061100000 - 0000000061113000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSHelperControls.dll
(0000000061900000 - 0000000061935000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSNavigationBarControl.dll
(0000000061d00000 - 0000000061d80000: C:\Program Files\Common Files\Roxio Shared\9.0\DLLShared\LayoutDll9.dll
(0000000061e00000 - 0000000061e41000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSNavigationControl.dll
(0000000062100000 - 0000000062121000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\LeResourceLoader.dll
(0000000069b10000 - 0000000069c42000: C:\WINDOWS\system32\msxml4.dll
(000000006f880000 - 000000006fa4a000: C:\WINDOWS\AppPatch\AcGenral.DLL
(0000000070400000 - 0000000070413000: C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSAlbumObjects.dll
(0000000071aa0000 - 0000000071aa8000: C:\WINDOWS\system32\WS2HELP.dll
(0000000071ab0000 - 0000000071ac7000: C:\WINDOWS\system32\WS2_32.dll
(0000000071ad0000 - 0000000071ad9000: C:\WINDOWS\system32\WSOCK32.dll
(0000000072000000 - 0000000072018000: C:\Program Files\Roxio\PhotoSuite 9\PPSRenderCtrl.dll
(0000000073000000 - 0000000073026000: C:\WINDOWS\system32\WINSPOOL.DRV
(0000000074290000 - 0000000074294000: C:\WINDOWS\system32\ICMP.DLL
(00000000745e0000 - 00000000748a6000: C:\WINDOWS\system32\msi.dll
(0000000074c80000 - 0000000074cac000: C:\WINDOWS\system32\OLEACC.dll
(0000000074ed0000 - 0000000074ede000: C:\WINDOWS\system32\wbem\wbemsvc.dll
(0000000074ef0000 - 0000000074ef8000: C:\WINDOWS\system32\wbem\wbemprox.dll
(0000000075290000 - 00000000752c7000: C:\WINDOWS\system32\wbem\wbemcomn.dll
(0000000075690000 - 0000000075706000: C:\WINDOWS\system32\wbem\fastprox.dll
(0000000075e90000 - 0000000075f40000: C:\WINDOWS\system32\SXS.DLL
(0000000076080000 - 00000000760e5000: C:\WINDOWS\system32\MSVCP60.dll
(0000000076780000 - 0000000076789000: C:\WINDOWS\system32\SHFOLDER.dll
(00000000767a0000 - 00000000767b3000: C:\WINDOWS\system32\NTDSAPI.dll
(00000000769c0000 - 0000000076a73000: C:\WINDOWS\system32\USERENV.dll
(0000000076b40000 - 0000000076b6d000: C:\WINDOWS\system32\WINMM.dll
(0000000076d60000 - 0000000076d79000: C:\WINDOWS\system32\iphlpapi.dll
(0000000076f20000 - 0000000076f47000: C:\WINDOWS\system32\DNSAPI.dll
(0000000076f60000 - 0000000076f8c000: C:\WINDOWS\system32\WLDAP32.dll
(0000000076fd0000 - 000000007704f000: C:\WINDOWS\system32\CLBCATQ.DLL
(0000000077050000 - 0000000077115000: C:\WINDOWS\system32\COMRes.dll
(0000000077120000 - 00000000771ac000: C:\WINDOWS\system32\OLEAUT32.dll
(00000000771b0000 - 0000000077259000: C:\WINDOWS\system32\WININET.dll
(00000000773d0000 - 00000000774d3000: C:\WINDOWS\WinSxS\x86_Microsoft.Windows.Common-Controls_6595b64144ccf1df_6.0.2600.2982_x-ww_ac3f9c03\COMCTL32.dll
(00000000774e0000 - 000000007761d000: C:\WINDOWS\system32\ole32.dll
(0000000077920000 - 0000000077a13000: C:\WINDOWS\system32\SETUPAPI.dll
(0000000077a80000 - 0000000077b14000: C:\WINDOWS\system32\CRYPT32.dll
(0000000077b20000 - 0000000077b32000: C:\WINDOWS\system32\MSASN1.dll
(0000000077b40000 - 0000000077b62000: C:\WINDOWS\system32\Apphelp.dll
(0000000077be0000 - 0000000077bf5000: C:\WINDOWS\system32\MSACM32.dll
(0000000077c00000 - 0000000077c08000: C:\WINDOWS\system32\VERSION.dll
(0000000077c10000 - 0000000077c68000: C:\WINDOWS\system32\msvcrt.dll
(0000000077d40000 - 0000000077dd0000: C:\WINDOWS\system32\USER32.dll
(0000000077dd0000 - 0000000077e6b000: C:\WINDOWS\system32\ADVAPI32.dll
(0000000077e70000 - 0000000077f01000: C:\WINDOWS\system32\RPCRT4.dll
(0000000077f10000 - 0000000077f57000: C:\WINDOWS\system32\GDI32.dll
(0000000077f60000 - 0000000077fd6000: C:\WINDOWS\system32\SHLWAPI.dll
(0000000077fe0000 - 0000000077ff1000: C:\WINDOWS\system32\Secur32.dll
(000000007c140000 - 000000007c243000: C:\WINDOWS\system32\MFC71.DLL
(000000007c340000 - 000000007c396000: C:\WINDOWS\system32\MSVCR71.dll
(000000007c3a0000 - 000000007c41b000: C:\WINDOWS\system32\MSVCP71.dll
(000000007c800000 - 000000007c8f4000: C:\WINDOWS\system32\kernel32.dll
(000000007c900000 - 000000007c9b0000: C:\WINDOWS\system32\ntdll.dll
(000000007c9c0000 - 000000007d1d5000: C:\WINDOWS\system32\SHELL32.dll
(000000007e1e0000 - 000000007e282000: C:\WINDOWS\system32\urlmon.dll
*----> State Dump for Thread Id 0xdc <----*
eax=0273ee90 ebx=00000000 ecx=00000000 edx=0013ed44 esi=0013ed8c edi=0013ed8c
eip=0040dbbb esp=0013ed28 ebp=0013ed3c iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
*** WARNING: Unable to verify checksum for C:\Program Files\Roxio\PhotoSuite 9\PhotoSuite9.exe
*** ERROR: Module load completed but symbols could not be loaded for C:\Program Files\Roxio\PhotoSuite 9\PhotoSuite9.exe
function: PhotoSuite9
0040dba7 85c0 test eax,eax
0040dba9 56 push esi
0040dbaa 57 push edi
0040dbab 8bf9 mov edi,ecx
0040dbad 7425 jz PhotoSuite9+0xdbd4 (0040dbd4)
0040dbaf 8b08 mov ecx,[eax]
0040dbb1 8d5508 lea edx,[ebp+0x8]
0040dbb4 52 push edx
0040dbb5 6808d14800 push 0x48d108
0040dbba 50 push eax
FAULT ->0040dbbb ff11 call dword ptr [ecx] ds:0023:00000000=????????
0040dbbd 8bf0 mov esi,eax
0040dbbf 85f6 test esi,esi
0040dbc1 7c05 jl PhotoSuite9+0xdbc8 (0040dbc8)
0040dbc3 8b4508 mov eax,[ebp+0x8]
0040dbc6 eb02 jmp PhotoSuite9+0xdbca (0040dbca)
0040dbc8 33c0 xor eax,eax
0040dbca 50 push eax
0040dbcb 8bcf mov ecx,edi
0040dbcd e820fcffff call PhotoSuite9+0xd7f2 (0040d7f2)
0040dbd2 eb0e jmp PhotoSuite9+0xdbe2 (0040dbe2)
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\USER32.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ntdll.dll -
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\kernel32.dll -
ChildEBP RetAddr Args to Child
0013ed3c 0040df6b 0273ee90 02735e38 0046eee6 PhotoSuite9+0xdbbb
0013eda0 00432741 027574e0 0013eeac 00000000 PhotoSuite9+0xdf6b
0013ee2c 00433f56 00000001 00000000 0013eff4 PhotoSuite9+0x32741
0013ee54 00431194 000402a2 00000001 00000000 PhotoSuite9+0x33f56
0013eea4 77d48734 00000000 00000001 00000000 PhotoSuite9+0x31194
0013eed0 77d4d05b 001bd158 000402a2 00000001 USER32!GetDC+0x6d
0013ef38 77d4b4c0 00000000 001bd158 000402a2 USER32!EnumDisplayMonitors+0xf8
0013ef8c 77d4fd29 007315a0 00000001 00000000 USER32!DefWindowProcW+0x184
0013efbc 7c90eae3 0013efcc 00000080 00000080 USER32!UserClientDllInitialize+0x7f1
0013f4ec 77d501f7 00040300 0000c1ea 0013f584 ntdll!KiUserCallbackDispatcher+0x13
0013f598 77d4ff83 00040300 0000c1ea 0013f584 USER32!CreateWindowExW+0x2a7
0013f5d4 0041f6ee 00040300 0000c1ea 001bd174 USER32!CreateWindowExW+0x33
0013f610 0042783a 00000000 004abd30 001bd174 PhotoSuite9+0x1f6ee
0013f63c 0042d424 00000000 00000000 001bd174 PhotoSuite9+0x2783a
0013f6d8 0045d225 00000000 004ae3f0 00000000 PhotoSuite9+0x2d424
0013feb4 0045db6b 000208e4 00000001 000208e4 PhotoSuite9+0x5d225
0013ff18 00477168 01400000 00000000 000208e4 PhotoSuite9+0x5db6b
0013ffc0 7c816fd7 011ed1fc 00000018 7ffdc000 PhotoSuite9+0x77168
0013fff0 00000000 00476fc8 00000000 78746341 kernel32!RegisterWaitForInputIdle+0x49
*----> Raw Stack Dump <----*
000000000013ed28 90 ee 73 02 08 d1 48 00 - 44 ed 13 00 01 00 00 00 ..s...H.D.......
000000000013ed38 8c ed 13 00 a0 ed 13 00 - 6b df 40 00 90 ee 73 02 ........k.@...s.
000000000013ed48 38 5e 73 02 e6 ee 46 00 - 90 ee 73 02 16 48 d5 77 8^s...F...s..H.w
000000000013ed58 4c f7 13 00 b0 fa 13 00 - 00 00 73 02 df a1 45 00 L.........s...E.
000000000013ed68 50 d6 23 00 bc 68 41 00 - 00 00 13 00 41 89 41 00 P.#..hA.....A.A.
000000000013ed78 20 d6 23 00 16 48 d5 77 - 02 00 00 00 00 00 00 00 .#..H.w........
000000000013ed88 38 5e 73 02 00 00 00 00 - e8 03 00 00 20 ee 13 00 8^s......... ...
000000000013ed98 5a dd 47 00 00 00 00 00 - 2c ee 13 00 41 27 43 00 Z.G.....,...A'C.
000000000013eda8 e0 74 75 02 ac ee 13 00 - 00 00 00 00 01 00 00 00 .tu.............
000000000013edb8 01 b4 d4 77 04 00 00 00 - 00 00 00 00 00 00 00 00 ...w............
000000000013edc8 8e 02 0c 00 00 00 00 00 - 00 00 00 00 01 00 00 00 ................
000000000013edd8 01 00 00 00 00 00 00 00 - 00 00 00 00 e3 ea 90 7c ...............|
000000000013ede8 ff ff 13 00 18 00 00 00 - 4c f7 13 00 28 b7 3f 00 ........L...(.?.
000000000013edf8 00 00 00 00 00 00 00 00 - 50 68 6f 74 6f 53 75 69 ........PhotoSui
000000000013ee08 74 65 00 77 92 cd d3 61 - 0a 00 00 00 0f 00 00 00 te.w...a........
000000000013ee18 4d 60 15 1e ac ed 13 00 - 28 ef 13 00 65 95 47 00 M`......(...e.G.
000000000013ee28 00 00 00 00 54 ee 13 00 - 56 3f 43 00 01 00 00 00 ....T...V?C.....
000000000013ee38 00 00 00 00 f4 ef 13 00 - 64 ee 13 00 00 00 00 00 ........d.......
000000000013ee48 4c f7 13 00 00 00 00 00 - 4c f7 13 00 a4 ee 13 00 L.......L.......
000000000013ee58 94 11 43 00 a2 02 04 00 - 01 00 00 00 00 00 00 00 ..C.............
*----> State Dump for Thread Id 0x89c <----*
eax=0045a44e ebx=00000000 ecx=004000f8 edx=00000003 esi=00000094 edi=00000000
eip=7c90eb94 esp=00bdff20 ebp=00bdff84 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00bdff84 7c802532 00000094 ffffffff 00000000 ntdll!KiFastSystemCallRet
00bdff98 0045a414 00000094 ffffffff 7c910833 kernel32!WaitForSingleObject+0x12
00bdffec 00000000 0045a44e 004ae3f0 00000000 PhotoSuite9+0x5a414
*----> Raw Stack Dump <----*
0000000000bdff20 c0 e9 90 7c cb 25 80 7c - 94 00 00 00 00 00 00 00 ...|.%.|........
0000000000bdff30 00 00 00 00 20 25 80 7c - f0 e3 4a 00 00 00 00 00 .... %.|..J.....
0000000000bdff40 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000bdff50 10 00 00 00 00 00 00 00 - 00 00 00 00 00 c0 fd 7f ................
0000000000bdff60 00 e0 fd 7f 00 00 00 00 - 00 00 00 00 34 ff bd 00 ............4...
0000000000bdff70 e7 e2 6e 80 dc ff bd 00 - a8 9a 83 7c f8 25 80 7c ..n........|.%.|
0000000000bdff80 00 00 00 00 98 ff bd 00 - 32 25 80 7c 94 00 00 00 ........2%.|....
0000000000bdff90 ff ff ff ff 00 00 00 00 - ec ff bd 00 14 a4 45 00 ..............E.
0000000000bdffa0 94 00 00 00 ff ff ff ff - 33 08 91 7c 00 00 ff ff ........3..|....
0000000000bdffb0 f0 e3 4a 00 57 a4 45 00 - 83 b6 80 7c f0 e3 4a 00 ..J.W.E....|..J.
0000000000bdffc0 33 08 91 7c 00 00 ff ff - f0 e3 4a 00 00 e0 fd 7f 3..|......J.....
0000000000bdffd0 00 46 3c 82 c0 ff bd 00 - 70 b2 3b 81 ff ff ff ff .F<.....p.;.....
0000000000bdffe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000000bdfff0 00 00 00 00 4e a4 45 00 - f0 e3 4a 00 00 00 00 00 ....N.E...J.....
0000000000be0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000be0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000be0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000be0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000be0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000be0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xf0 <----*
eax=00ceff54 ebx=00000000 ecx=00163330 edx=7c90eb94 esi=00163330 edi=00000100
eip=7c90eb94 esp=00cefe1c ebp=00ceff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\RPCRT4.dll -
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00ceff80 77e76c22 00ceffa8 77e76a3b 00163330 ntdll!KiFastSystemCallRet
00ceff88 77e76a3b 00163330 00000018 0013f814 RPCRT4!I_RpcBCacheFree+0x5ea
00ceffa8 77e76c0a 0016ff80 00ceffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
00ceffb4 7c80b683 00179b78 00000018 0013f814 RPCRT4!I_RpcBCacheFree+0x5d2
00ceffec 00000000 77e76bf0 00179b78 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000cefe1c 99 e3 90 7c 03 67 e7 77 - 18 01 00 00 70 ff ce 00 ...|.g.w....p...
0000000000cefe2c 00 00 00 00 70 e3 1a 00 - 54 ff ce 00 2f c5 57 80 ....p...T.../.W.
0000000000cefe3c 4a c5 57 80 64 2d a0 f8 - 0c fc 8e 00 aa c4 57 80 J.W.d-........W.
0000000000cefe4c 60 ac 56 80 f8 7b 3c 82 - e8 02 46 81 b0 31 0b ff `.V..{<...F..1..
0000000000cefe5c 20 0e 00 00 1f 0e 00 00 - 10 43 cb e3 00 00 00 02 ........C......
0000000000cefe6c 74 2b a0 f8 f3 fa 5f 80 - 00 00 00 00 0c 00 00 00 t+...._.........
0000000000cefe7c 18 43 cb e3 e8 02 46 81 - 98 2b a0 f8 e3 6c 56 80 .C....F..+...lV.
0000000000cefe8c a0 bd a5 e3 74 01 00 00 - f8 7b 3c 82 a0 bd a5 e3 ....t....{<.....
0000000000cefe9c b0 31 0b ff 74 01 00 00 - 00 00 00 00 b0 bd a5 e3 .1..t...........
0000000000cefeac e8 62 10 e2 b1 31 0b ff - b4 2b a0 f8 0a 6e 56 80 .b...1...+...nV.
0000000000cefebc a0 bd a5 e3 e8 62 10 e2 - f8 7b 3c 82 03 00 1f 00 .....b...{<.....
0000000000cefecc b0 31 0b ff 74 01 00 00 - fc 2b a0 f8 a3 aa 56 80 .1..t....+....V.
0000000000cefedc a0 bd a5 e3 00 00 00 00 - 10 96 0a 82 00 00 00 00 ................
0000000000cefeec b0 31 0b ff f0 e9 64 ff - 04 77 17 82 1e 03 00 00 .1....d..w......
0000000000cefefc 5b 03 00 00 56 00 00 00 - ff 00 00 00 b0 31 0b ff [...V........1..
0000000000ceff0c 03 00 1f 00 b0 31 0b ff - 24 bb 67 81 24 2c a0 f8 .....1..$.g.$,..
0000000000ceff1c b2 c2 4d 80 ba c2 4d 80 - f4 ba 67 81 88 b9 67 81 ..M...M...g...g.
0000000000ceff2c bc b9 67 81 80 ff ce 00 - 99 66 e7 77 4c ff ce 00 ..g......f.wL...
0000000000ceff3c a9 66 e7 77 ed 10 90 7c - 50 9b 17 00 78 9b 17 00 .f.w...|P...x...
0000000000ceff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0x7ac <----*
eax=774fe429 ebx=00007530 ecx=7ffdc000 edx=00000000 esi=00000000 edi=00deff50
eip=7c90eb94 esp=00deff20 ebp=00deff78 iopl=0 nv up ei pl nz na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000206
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\WINDOWS\system32\ole32.dll -
ChildEBP RetAddr Args to Child
00deff78 7c802451 0000ea60 00000000 00deffb4 ntdll!KiFastSystemCallRet
00deff88 774fe31d 0000ea60 0017c4f0 774fe3dc kernel32!Sleep+0xf
00deffb4 7c80b683 0017c4f0 7c910945 7c91094e ole32!StringFromGUID2+0x51b
00deffec 00000000 774fe429 0017c4f0 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000deff20 5c d8 90 7c ed 23 80 7c - 00 00 00 00 50 ff de 00 \..|.#.|....P...
0000000000deff30 40 25 80 7c f8 6d 60 77 - 30 75 00 00 14 00 00 00 @%.|.m`w0u......
0000000000deff40 01 00 00 00 00 00 00 00 - 00 00 00 00 10 00 00 00 ................
0000000000deff50 00 ba 3c dc ff ff ff ff - 00 d1 4e 77 50 ff de 00 ..<.......NwP...
0000000000deff60 30 ff de 00 00 5f 16 00 - dc ff de 00 a8 9a 83 7c 0...._.........|
0000000000deff70 58 24 80 7c 00 00 00 00 - 88 ff de 00 51 24 80 7c X$.|........Q$.|
0000000000deff80 60 ea 00 00 00 00 00 00 - b4 ff de 00 1d e3 4f 77 `.............Ow
0000000000deff90 60 ea 00 00 f0 c4 17 00 - dc e3 4f 77 00 00 00 00 `.........Ow....
0000000000deffa0 45 09 91 7c f0 c4 17 00 - 00 00 4e 77 44 e4 4f 77 E..|......NwD.Ow
0000000000deffb0 4e 09 91 7c ec ff de 00 - 83 b6 80 7c f0 c4 17 00 N..|.......|....
0000000000deffc0 45 09 91 7c 4e 09 91 7c - f0 c4 17 00 00 b0 fd 7f E..|N..|........
0000000000deffd0 00 46 3c 82 c0 ff de 00 - e8 fd 79 81 ff ff ff ff .F<.......y.....
0000000000deffe0 a8 9a 83 7c 90 b6 80 7c - 00 00 00 00 00 00 00 00 ...|...|........
0000000000defff0 00 00 00 00 29 e4 4f 77 - f0 c4 17 00 00 00 00 00 ....).Ow........
0000000000df0000 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000df0010 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000df0020 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000df0030 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000df0040 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000df0050 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0xad0 <----*
eax=0017f000 ebx=000493e0 ecx=00eefc00 edx=00001000 esi=0000012c edi=00000000
eip=7c90eb94 esp=00eefed8 ebp=00eeff3c iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00eeff3c 7c802532 0000012c 000493e0 00000000 ntdll!KiFastSystemCallRet
00eeff50 77596432 0000012c 000493e0 00000000 kernel32!WaitForSingleObject+0x12
00eeff6c 77566e68 0000012c 00007530 7c802540 ole32!CoInstall+0x10b
00eeff8c 77527008 00eeffb4 774fe3dc 77606a18 ole32!CoWaitForMultipleHandles+0xfd27
00eeff94 774fe3dc 77606a18 0039002d 0017de78 ole32!CoGetObject+0x21a8
00eeffb4 7c80b683 0017de78 0039002d 00450039 ole32!StringFromGUID2+0x5da
00eeffec 00000000 774fe429 0017de78 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000eefed8 c0 e9 90 7c cb 25 80 7c - 2c 01 00 00 00 00 00 00 ...|.%.|,.......
0000000000eefee8 0c ff ee 00 00 00 00 00 - 20 25 80 7c e0 93 04 00 ........ %.|....
0000000000eefef8 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000eeff08 10 00 00 00 00 a2 2f 4d - ff ff ff ff 00 c0 fd 7f ....../M........
0000000000eeff18 00 a0 fd 7f 0c ff ee 00 - 40 ff ee 00 ec fe ee 00 ........@.......
0000000000eeff28 d7 d1 4f 77 dc ff ee 00 - a8 9a 83 7c f8 25 80 7c ..Ow.......|.%.|
0000000000eeff38 00 00 00 00 50 ff ee 00 - 32 25 80 7c 2c 01 00 00 ....P...2%.|,...
0000000000eeff48 e0 93 04 00 00 00 00 00 - 6c ff ee 00 32 64 59 77 ........l...2dYw
0000000000eeff58 2c 01 00 00 e0 93 04 00 - 00 00 00 00 18 6a 60 77 ,............j`w
0000000000eeff68 2c 01 00 00 8c ff ee 00 - 68 6e 56 77 2c 01 00 00 ,.......hnVw,...
0000000000eeff78 30 75 00 00 40 25 80 7c - 78 de 17 00 34 01 00 00 0u..@%.|x...4...
0000000000eeff88 10 96 17 00 94 ff ee 00 - 08 70 52 77 b4 ff ee 00 .........pRw....
0000000000eeff98 dc e3 4f 77 18 6a 60 77 - 2d 00 39 00 78 de 17 00 ..Ow.j`w-.9.x...
0000000000eeffa8 00 00 4e 77 44 e4 4f 77 - 39 00 45 00 ec ff ee 00 ..NwD.Ow9.E.....
0000000000eeffb8 83 b6 80 7c 78 de 17 00 - 2d 00 39 00 39 00 45 00 ...|x...-.9.9.E.
0000000000eeffc8 78 de 17 00 00 a0 fd 7f - 00 46 3c 82 c0 ff ee 00 x........F<.....
0000000000eeffd8 a0 d5 09 82 ff ff ff ff - a8 9a 83 7c 90 b6 80 7c ...........|...|
0000000000eeffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 29 e4 4f 77 ............).Ow
0000000000eefff8 78 de 17 00 00 00 00 00 - 00 00 00 00 00 00 00 00 x...............
0000000000ef0008 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x2d8 <----*
eax=00000004 ebx=00150288 ecx=00000003 edx=00000000 esi=00feff54 edi=00000000
eip=7c90eb94 esp=00feff14 ebp=00feff30 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
00feff30 7751375e 00feff54 00000000 00000000 ntdll!KiFastSystemCallRet
00feff70 775270d5 00007530 7c802540 001811c0 ole32!CoFreeUnusedLibrariesEx+0x214
00feff8c 77527008 00feffb4 774fe3dc 77606c28 ole32!CoGetObject+0x2275
00feff94 774fe3dc 77606c28 005f005e 001811c0 ole32!CoGetObject+0x21a8
00feffb4 7c80b683 001811c0 005f005e 00410060 ole32!StringFromGUID2+0x5da
00feffec 00000000 774fe429 001811c0 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000000feff14 be 91 d4 77 f1 91 d4 77 - 54 ff fe 00 00 00 00 00 ...w...wT.......
0000000000feff24 00 00 00 00 00 00 00 00 - c6 91 d4 77 70 ff fe 00 ...........wp...
0000000000feff34 5e 37 51 77 54 ff fe 00 - 00 00 00 00 00 00 00 00 ^7QwT...........
0000000000feff44 00 00 00 00 00 00 00 00 - 28 6c 60 77 00 00 00 00 ........(l`w....
0000000000feff54 88 02 15 00 00 04 00 00 - be ba 00 00 e4 1e 18 00 ................
0000000000feff64 20 d6 09 00 2c 00 00 00 - b6 01 00 00 8c ff fe 00 ...,...........
0000000000feff74 d5 70 52 77 30 75 00 00 - 40 25 80 7c c0 11 18 00 .pRw0u..@%.|....
0000000000feff84 84 01 00 00 00 18 18 00 - 94 ff fe 00 08 70 52 77 .............pRw
0000000000feff94 b4 ff fe 00 dc e3 4f 77 - 28 6c 60 77 5e 00 5f 00 ......Ow(l`w^._.
0000000000feffa4 c0 11 18 00 00 00 4e 77 - 44 e4 4f 77 60 00 41 00 ......NwD.Ow`.A.
0000000000feffb4 ec ff fe 00 83 b6 80 7c - c0 11 18 00 5e 00 5f 00 .......|....^._.
0000000000feffc4 60 00 41 00 c0 11 18 00 - 00 90 fd 7f 00 46 3c 82 `.A..........F<.
0000000000feffd4 c0 ff fe 00 a0 d5 09 82 - ff ff ff ff a8 9a 83 7c ...............|
0000000000feffe4 90 b6 80 7c 00 00 00 00 - 00 00 00 00 00 00 00 00 ...|............
0000000000fefff4 29 e4 4f 77 c0 11 18 00 - 00 00 00 00 00 00 00 00 ).Ow............
0000000000ff0004 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ff0014 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ff0024 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ff0034 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000000ff0044 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x980 <----*
eax=001d9000 ebx=00007530 ecx=010efcac edx=00001000 esi=0000015c edi=00000000
eip=7c90eb94 esp=010eff28 ebp=010eff8c iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00200297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
010eff8c 774fe407 0000015c 00007530 00000000 ntdll!KiFastSystemCallRet
010effb4 7c80b683 00181fc0 00160000 00000000 ole32!StringFromGUID2+0x605
010effec 00000000 774fe429 00181fc0 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
00000000010eff28 c0 e9 90 7c cb 25 80 7c - 5c 01 00 00 00 00 00 00 ...|.%.|\.......
00000000010eff38 5c ff 0e 01 40 25 80 7c - c0 1f 18 00 30 75 00 00 \...@%.|....0u..
00000000010eff48 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
00000000010eff58 10 00 00 00 00 5d 1e ee - ff ff ff ff 00 c0 fd 7f .....]..........
00000000010eff68 00 80 fd 7f 5c ff 0e 01 - 8c 5a 51 77 3c ff 0e 01 ....\....ZQw<...
00000000010eff78 a8 9a 1c 00 dc ff 0e 01 - a8 9a 83 7c f8 25 80 7c ...........|.%.|
00000000010eff88 00 00 00 00 b4 ff 0e 01 - 07 e4 4f 77 5c 01 00 00 ..........Ow\...
00000000010eff98 30 75 00 00 00 00 00 00 - 00 00 16 00 c0 1f 18 00 0u..............
00000000010effa8 00 00 4e 77 44 e4 4f 77 - 00 00 00 00 ec ff 0e 01 ..NwD.Ow........
00000000010effb8 83 b6 80 7c c0 1f 18 00 - 00 00 16 00 00 00 00 00 ...|............
00000000010effc8 c0 1f 18 00 00 80 fd 7f - 00 46 3c 82 c0 ff 0e 01 .........F<.....
00000000010effd8 a0 d5 09 82 ff ff ff ff - a8 9a 83 7c 90 b6 80 7c ...........|...|
00000000010effe8 00 00 00 00 00 00 00 00 - 00 00 00 00 29 e4 4f 77 ............).Ow
00000000010efff8 c0 1f 18 00 00 00 00 00 - c8 00 00 00 15 01 00 00 ................
00000000010f0008 ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00 ................
00000000010f0018 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... ..
00000000010f0028 5c 01 00 00 ff ef fd 7f - 0b 00 08 06 00 00 00 00 \...............
00000000010f0038 00 00 00 00 00 00 00 00 - 00 00 00 00 98 05 0f 01 ................
00000000010f0048 0f 00 00 00 f8 ff ff ff - 50 00 0f 01 50 00 0f 01 ........P...P...
00000000010f0058 40 06 0f 01 00 00 00 00 - 00 00 00 00 00 00 00 00 @...............
*----> State Dump for Thread Id 0xdb8 <----*
eax=00000001 ebx=ffffffff ecx=0170fd7c edx=003f79f4 esi=00000200 edi=00000000
eip=7c90eb94 esp=0170fdd4 ebp=0170fe38 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for C:\Program Files\Common Files\Roxio Shared\9.0\DLLShared\CPSCommonTools9.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Common Files\Roxio Shared\9.0\DLLShared\CPSCommonTools9.dll -
*** WARNING: Unable to verify checksum for C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSFileLoader.dll
*** ERROR: Symbol file could not be found. Defaulted to export symbols for C:\Program Files\Common Files\Roxio Shared\9.0\SharedCOM\CPSFileLoader.dll -
ChildEBP RetAddr Args to Child
0170fe38 7c802532 00000200 000001f4 00000000 ntdll!KiFastSystemCallRet
0170fe4c 60f04aab 00000200 000001f4 60310e61 kernel32!WaitForSingleObject+0x12
0170fe94 60311123 0170fe80 0170febc 00000001 CPSCommonTools9!CMGISyncObject__Lock+0xd
0170ff70 60f1af44 7c929367 003f90b0 003f9018 CPSFileLoader+0x11123
0170ffb4 7c80b683 003f9018 7c929367 010ef328 CPSCommonTools9!CMGIShellNameSplitter__CMGIShellNameSplitter+0x98
0170ffec 00000000 7c3494f6 003f9018 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000170fdd4 c0 e9 90 7c cb 25 80 7c - 00 02 00 00 00 00 00 00 ...|.%.|........
000000000170fde4 08 fe 70 01 60 ff 70 01 - ec 79 3f 00 ff ff ff ff ..p.`.p..y?.....
000000000170fdf4 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000170fe04 10 00 00 00 c0 b4 b3 ff - ff ff ff ff 00 c0 fd 7f ................
000000000170fe14 00 70 fd 7f 08 fe 70 01 - f8 16 34 7c e8 fd 70 01 .p....p...4|..p.
000000000170fe24 00 00 00 00 88 fe 70 01 - a8 9a 83 7c f8 25 80 7c ......p....|.%.|
000000000170fe34 00 00 00 00 4c fe 70 01 - 32 25 80 7c 00 02 00 00 ....L.p.2%.|....
000000000170fe44 f4 01 00 00 00 00 00 00 - 94 fe 70 01 ab 4a f0 60 ..........p..J.`
000000000170fe54 00 02 00 00 f4 01 00 00 - 61 0e 31 60 f4 01 00 00 ........a.1`....
000000000170fe64 02 00 00 00 90 8f 3f 00 - 01 00 00 00 64 ff 70 01 ......?.....d.p.
000000000170fe74 a8 9a 83 7c f8 25 80 7c - ff ff ff ff 3c 34 f3 60 ...|.%.|....<4.`
000000000170fe84 00 02 00 00 64 ff 70 01 - 33 e3 31 60 00 00 00 00 ....d.p.3.1`....
000000000170fe94 70 ff 70 01 23 11 31 60 - 80 fe 70 01 bc fe 70 01 p.p.#.1`..p...p.
000000000170fea4 01 00 00 00 5c ff 70 01 - f4 01 00 00 18 f6 0e 01 ....\.p.........
000000000170feb4 90 8f 3f 00 00 02 00 00 - 00 00 00 00 00 00 00 00 ..?.............
000000000170fec4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000170fed4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000170fee4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000170fef4 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000170ff04 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x900 <----*
eax=7c3494f6 ebx=ffffffff ecx=7ffdc000 edx=60321ae8 esi=00000214 edi=00000000
eip=7c90eb94 esp=0180fd40 ebp=0180fda4 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0180fda4 7c802532 00000214 000001f4 00000000 ntdll!KiFastSystemCallRet
0180fdb8 60f04aab 00000214 000001f4 60310e61 kernel32!WaitForSingleObject+0x12
0180fe00 60310f63 0180fdec 0180fec0 00000000 CPSCommonTools9!CMGISyncObject__Lock+0xd
0180ff70 60f1af44 7c929367 003f9ac8 003f9018 CPSFileLoader+0x10f63
0180ffb4 7c80b683 003f9018 7c929367 010ef328 CPSCommonTools9!CMGIShellNameSplitter__CMGIShellNameSplitter+0x98
0180ffec 00000000 7c3494f6 003f9018 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000180fd40 c0 e9 90 7c cb 25 80 7c - 14 02 00 00 00 00 00 00 ...|.%.|........
000000000180fd50 74 fd 80 01 60 ff 80 01 - 88 79 3f 00 ff ff ff ff t...`....y?.....
000000000180fd60 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000180fd70 10 00 00 00 c0 b4 b3 ff - ff ff ff ff 00 c0 fd 7f ................
000000000180fd80 00 60 fd 7f 74 fd 80 01 - f8 16 34 7c 54 fd 80 01 .`..t.....4|T...
000000000180fd90 00 00 00 00 f4 fd 80 01 - a8 9a 83 7c f8 25 80 7c ...........|.%.|
000000000180fda0 00 00 00 00 b8 fd 80 01 - 32 25 80 7c 14 02 00 00 ........2%.|....
000000000180fdb0 f4 01 00 00 00 00 00 00 - 00 fe 80 01 ab 4a f0 60 .............J.`
000000000180fdc0 14 02 00 00 f4 01 00 00 - 61 0e 31 60 f4 01 00 00 ........a.1`....
000000000180fdd0 02 00 00 00 48 91 3f 00 - 01 00 00 00 64 ff 80 01 ....H.?.....d...
000000000180fde0 a8 9a 83 7c f8 25 80 7c - ff ff ff ff 3c 34 f3 60 ...|.%.|....<4.`
000000000180fdf0 14 02 00 00 64 ff 80 01 - 33 e3 31 60 00 00 00 00 ....d...3.1`....
000000000180fe00 70 ff 80 01 63 0f 31 60 - ec fd 80 01 c0 fe 80 01 p...c.1`........
000000000180fe10 00 00 00 00 5c ff 80 01 - f4 01 00 00 18 f6 0e 01 ....\...........
000000000180fe20 48 91 3f 00 14 02 00 00 - 00 00 00 00 00 00 00 00 H.?.............
000000000180fe30 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000180fe40 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000180fe50 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000180fe60 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000180fe70 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x9a8 <----*
eax=7c3494f6 ebx=ffffffff ecx=7ffdc000 edx=60321ae8 esi=00000228 edi=00000000
eip=7c90eb94 esp=0190fd40 ebp=0190fda4 iopl=0 nv up ei ng nz ac po cy
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000297
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
0190fda4 7c802532 00000228 000001f4 00000000 ntdll!KiFastSystemCallRet
0190fdb8 60f04aab 00000228 000001f4 60310e61 kernel32!WaitForSingleObject+0x12
0190fe00 60310f63 0190fdec 0190fec0 00000000 CPSCommonTools9!CMGISyncObject__Lock+0xd
0190ff70 60f1af44 7c929367 003f9be8 003f9018 CPSFileLoader+0x10f63
0190ffb4 7c80b683 003f9018 7c929367 010ef328 CPSCommonTools9!CMGIShellNameSplitter__CMGIShellNameSplitter+0x98
0190ffec 00000000 7c3494f6 003f9018 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
000000000190fd40 c0 e9 90 7c cb 25 80 7c - 28 02 00 00 00 00 00 00 ...|.%.|(.......
000000000190fd50 74 fd 90 01 60 ff 90 01 - 88 79 3f 00 ff ff ff ff t...`....y?.....
000000000190fd60 14 00 00 00 01 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000190fd70 10 00 00 00 c0 b4 b3 ff - ff ff ff ff 00 c0 fd 7f ................
000000000190fd80 00 50 fd 7f 74 fd 90 01 - f8 16 34 7c 54 fd 90 01 .P..t.....4|T...
000000000190fd90 00 00 00 00 f4 fd 90 01 - a8 9a 83 7c f8 25 80 7c ...........|.%.|
000000000190fda0 00 00 00 00 b8 fd 90 01 - 32 25 80 7c 28 02 00 00 ........2%.|(...
000000000190fdb0 f4 01 00 00 00 00 00 00 - 00 fe 90 01 ab 4a f0 60 .............J.`
000000000190fdc0 28 02 00 00 f4 01 00 00 - 61 0e 31 60 f4 01 00 00 (.......a.1`....
000000000190fdd0 02 00 00 00 60 9b 3f 00 - 01 00 00 00 64 ff 90 01 ....`.?.....d...
000000000190fde0 a8 9a 83 7c f8 25 80 7c - ff ff ff ff 3c 34 f3 60 ...|.%.|....<4.`
000000000190fdf0 28 02 00 00 64 ff 90 01 - 33 e3 31 60 00 00 00 00 (...d...3.1`....
000000000190fe00 70 ff 90 01 63 0f 31 60 - ec fd 90 01 c0 fe 90 01 p...c.1`........
000000000190fe10 00 00 00 00 5c ff 90 01 - f4 01 00 00 18 f6 0e 01 ....\...........
000000000190fe20 60 9b 3f 00 28 02 00 00 - 00 00 00 00 00 00 00 00 `.?.(...........
000000000190fe30 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000190fe40 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000190fe50 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000190fe60 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
000000000190fe70 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x99c <----*
eax=5b890e71 ebx=00000000 ecx=7c913288 edx=ffffffff esi=00000000 edi=7c90d8e3
eip=7c90eb94 esp=01c1ff88 ebp=01c1ffb4 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01c1ffb4 7c80b683 00000000 0013d4dc 7c90ee18 ntdll!KiFastSystemCallRet
01c1ffec 00000000 5b890e71 00000000 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001c1ff88 ab e9 90 7c e4 0e 89 5b - 02 00 00 00 ac ff c1 01 ...|...[........
0000000001c1ff98 01 00 00 00 01 00 00 00 - 00 00 00 00 dc d4 13 00 ................
0000000001c1ffa8 18 ee 90 7c 98 02 00 00 - 9c 02 00 00 ec ff c1 01 ...|............
0000000001c1ffb8 83 b6 80 7c 00 00 00 00 - dc d4 13 00 18 ee 90 7c ...|...........|
0000000001c1ffc8 00 00 00 00 00 40 fd 7f - 00 46 3c 82 c0 ff c1 01 .....@...F<.....
0000000001c1ffd8 50 54 fc fe ff ff ff ff - a8 9a 83 7c 90 b6 80 7c PT.........|...|
0000000001c1ffe8 00 00 00 00 00 00 00 00 - 00 00 00 00 71 0e 89 5b ............q..[
0000000001c1fff8 00 00 00 00 00 00 00 00 - c8 00 00 00 3e 01 00 00 ............>...
0000000001c20008 ff ee ff ee 02 10 00 00 - 00 00 00 00 00 fe 00 00 ................
0000000001c20018 00 00 10 00 00 20 00 00 - 00 02 00 00 00 20 00 00 ..... ....... ..
0000000001c20028 cd 15 00 00 ff ef fd 7f - 12 00 08 06 00 00 00 00 ................
0000000001c20038 00 00 00 00 00 00 00 00 - 00 00 00 00 b8 05 c2 01 ................
0000000001c20048 0f 00 00 00 f8 ff ff ff - 50 00 c2 01 50 00 c2 01 ........P...P...
0000000001c20058 40 06 c2 01 00 00 00 00 - 00 00 00 00 00 00 00 00 @...............
0000000001c20068 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c20078 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c20088 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c20098 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c200a8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001c200b8 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
*----> State Dump for Thread Id 0x84c <----*
eax=77e76bf0 ebx=00000000 ecx=0000000c edx=00351fb0 esi=00163330 edi=00000100
eip=7c90eb94 esp=01e1fe1c ebp=01e1ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01e1ff80 77e76c22 01e1ffa8 77e76a3b 00163330 ntdll!KiFastSystemCallRet
01e1ff88 77e76a3b 00163330 00000000 00350178 RPCRT4!I_RpcBCacheFree+0x5ea
01e1ffa8 77e76c0a 0016ff80 01e1ffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
01e1ffb4 7c80b683 0018b250 00000000 00350178 RPCRT4!I_RpcBCacheFree+0x5d2
01e1ffec 00000000 77e76bf0 0018b250 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001e1fe1c 99 e3 90 7c 03 67 e7 77 - 18 01 00 00 70 ff e1 01 ...|.g.w....p...
0000000001e1fe2c 00 00 00 00 b0 4e 23 00 - 54 ff e1 01 00 00 00 00 .....N#.T.......
0000000001e1fe3c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1fe4c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1fe5c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1fe6c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1fe7c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1fe8c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1fe9c 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1feac 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1febc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1fecc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1fedc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1feec 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1fefc 00 00 00 00 00 00 00 00 - 00 00 00 00 00 00 00 00 ................
0000000001e1ff0c 00 00 00 00 00 00 00 00 - 1c 7b 07 ff 24 9c 5a b6 .........{..$.Z.
0000000001e1ff1c b2 c2 4d 80 ba c2 4d 80 - ec 7a 07 ff 80 79 07 ff ..M...M..z...y..
0000000001e1ff2c b4 79 07 ff 80 ff e1 01 - 99 66 e7 77 4c ff e1 01 .y.......f.wL...
0000000001e1ff3c a9 66 e7 77 ed 10 90 7c - 18 90 1a 00 50 b2 18 00 .f.w...|....P...
0000000001e1ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0x9b8 <----*
eax=00000830 ebx=00000000 ecx=00000810 edx=000372cc esi=00163330 edi=00000100
eip=7c90eb94 esp=01f1fe1c ebp=01f1ff80 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
ChildEBP RetAddr Args to Child
01f1ff80 77e76c22 01f1ffa8 77e76a3b 00163330 ntdll!KiFastSystemCallRet
01f1ff88 77e76a3b 00163330 00000000 01100318 RPCRT4!I_RpcBCacheFree+0x5ea
01f1ffa8 77e76c0a 0016ff80 01f1ffec 7c80b683 RPCRT4!I_RpcBCacheFree+0x403
01f1ffb4 7c80b683 001acab0 00000000 01100318 RPCRT4!I_RpcBCacheFree+0x5d2
01f1ffec 00000000 77e76bf0 001acab0 00000000 kernel32!GetModuleFileNameA+0x1b4
*----> Raw Stack Dump <----*
0000000001f1fe1c 99 e3 90 7c 03 67 e7 77 - 18 01 00 00 70 ff f1 01 ...|.g.w....p...
0000000001f1fe2c 00 00 00 00 c0 c3 17 00 - 54 ff f1 01 35 36 45 43 ........T...56EC
0000000001f1fe3c 43 46 00 43 5f 41 39 34 - 31 46 33 46 32 33 33 31 CF.C_A941F3F2331
0000000001f1fe4c 39 38 33 43 42 43 44 45 - 43 32 32 44 33 44 41 32 983CBCDEC22D3DA2
0000000001f1fe5c 43 37 37 32 41 00 4b 49 - 5f 32 34 32 38 31 44 39 C772A.KI_24281D9
0000000001f1fe6c 45 31 30 46 45 41 31 44 - 34 42 31 46 42 33 34 38 E10FEA1D4B1FB348
0000000001f1fe7c 33 32 33 30 34 39 34 42 - 33 00 49 5f 31 38 42 41 3230494B3.I_18BA
0000000001f1fe8c 33 37 39 31 30 38 43 44 - 37 43 43 43 32 46 41 30 379108CD7CCC2FA0
0000000001f1fe9c 46 44 37 35 34 41 44 34 - 35 41 32 35 2e 35 2e 32 FD754AD45A25.5.2
0000000001f1feac 37 35 30 31 39 2e 31 36 - 32 00 4b 49 5f 32 36 31 75019.162.KI_261
0000000001f1febc 42 44 35 44 42 36 39 35 - 41 45 33 35 42 39 34 42 BD5DB695AE35B94B
0000000001f1fecc 35 37 43 34 30 43 39 36 - 31 33 45 38 32 00 49 5f 57C40C9613E82.I_
0000000001f1fedc 31 38 42 41 33 37 39 31 - 30 38 43 44 37 43 43 43 18BA379108CD7CCC
0000000001f1feec 32 46 41 30 46 44 37 35 - 34 41 44 34 35 41 32 35 2FA0FD754AD45A25
0000000001f1fefc 2e 35 2e 32 37 32 37 36 - 32 2e 31 35 35 00 4b 49 .5.272762.155.KI
0000000001f1ff0c 5f 33 31 32 42 37 37 36 - 1c 8d 68 81 24 2c 02 b6 _312B776..h.$,..
0000000001f1ff1c b2 c2 4d 80 ba c2 4d 80 - ec 8c 68 81 80 8b 68 81 ..M...M...h...h.
0000000001f1ff2c b4 8b 68 81 80 ff f1 01 - 99 66 e7 77 4c ff f1 01 ..h......f.wL...
0000000001f1ff3c a9 66 e7 77 ed 10 90 7c - 70 92 1a 00 b0 ca 1a 00 .f.w...|p.......
0000000001f1ff4c 00 a2 2f 4d ff ff ff ff - 00 5d 1e ee ff ff ff ff ../M.....]......
*----> State Dump for Thread Id 0x7cc <----*
eax=7c3494f6 ebx=028afb9c ecx=00000000 edx=0013ee50 esi=00000000 edi=7ffdc000
eip=7c90eb94 esp=028afb74 ebp=028afc10 iopl=0 nv up ei pl zr na po nc
cs=001b ss=0023 ds=0023 es=0023 fs=003b gs=0000 efl=00000246
function: ntdll!KiFastSystemCallRet
7c90eb89 90 nop
7c90eb8a 90 nop
ntdll!KiFastSystemCall:
7c90eb8b 8bd4 mov edx,esp
7c90eb8d 0f34 sysenter
7c90eb8f 90 nop
7c90eb90 90 nop
7c90eb91 90 nop
7c90eb92 90 nop
7c90eb93 90 nop
ntdll!KiFastSystemCallRet:
7c90eb94 c3 ret
7c90eb95 8da42400000000 lea esp,[esp]
7c90eb9c 8d642400 lea esp,[esp]
7c90eba0 90 nop
7c90eba1 90 nop
7c90eba2 90 nop
7c90eba3 90 nop
7c90eba4 90 nop
ntdll!KiIntSystemCall:
7c90eba5 8d542408 lea edx,[esp+0x8]
7c90eba9 cd2e int 2e
*----> Stack Back Trace <----*
WARNING: Stack unwind information not available. Following frames may be wrong.
*** WARNING: Unable to verify checksum for C:\Program Files\Common Files\Roxio Shared\DLLShared\SonicHTTPClient9.dll
*** ERROR: Symbol file could
Link to comment
Share on other sites
2 answers to this question
Recommended Posts
Archived
This topic is now archived and is closed to further replies.